Smarter, more efficient electricity meters aim to revolutionise energy distribution but WA researchers fear hackers could easily exploit numerous security flaws and wreck havoc on power grids. Smart meters measure a customer's electricity ...
Tags: electricity meters, energy distribution, power grids, security flaws
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal ...
Tags: National Security Agency's hacking unit, Tailored Access Operations
The U.S Food and Drug Administration has filed its rule on intentional adulteration under the Food Safety Modernization Act (FSMA), keeping to a court-ordered deadline of Dec. 20. "Focused Mitigation Strategies to Protect Food Against ...
Tags: Agriculture, Food
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year. It has also predicted an increase in advanced mobile banking and targeted attacks, along with ...
Tags: Trend Micro, Security, data breach, internet, web
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline. NSS Labs research ...
Tags: Computer Products, software
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
After a series of media reports, it is clear that wireless implanted medical devices can be hacked. Although the risk is now more hypothetical than actual, the vulnerabilities warrant attention. Implanted devices often rely on wireless ...
The Bank of England has revealed that several of the UK's banks have been hit by cyber attacks in the last six months, which have led to the institutions making financial losses. In its Financial Stability Report, the bank said that the ...
Tags: Computer Products, software
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, ...
Tags: Online Banking, Threatonline, financial services, security
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies as “W32.Shadesrat,” ...
Tags: Symantec, Blackshades, malware
AeroDef Manufacturing Summit and Exposition 2014 announces four panel discussions focused on the most critical issues facing aerospace and defense manufacturing today as part of their Executive Insights Series. AeroDef Manufacturing takes ...
Tags: Executive Insights, AeroDef
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products. Unlike other bug bounty programmes, the ...
Tags: security, researcher, laud, Microsoft, Facebook, bounty
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
Value-added distributor Spectrami held a Muscat workshop in conjunction with Tenable Network Security which addressed a variety of security concerns. TechCafe’ covered real time security concerns, advance threats, vulnerability and ...
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software