The Reserve Bank of Australia's computer systems have fallen victim to cyber hacking in at least two highly sophisticated online attacks. Documents released by the RBA show that the central bank was the victim of a "highly targeted" email ...
Tags: Hackers, RBA computers, malicious software
China's plan to create a substantial outsourcing industry was hit with another blow last month with the release of a report that laid bare, in ways never seen before, the extent of the security risks of working in the country. Ten years ...
Tags: substantial outsourcing industry, China, security risk
China's foreign minster on Saturday called on nations to cooperate on Internet security, rather than wage cyberwarfare, as he denied accusations in a recent report that the country's military was behind hacking attacks. "Cyberspace needs ...
Tags: Internet security, cyberwarfare, China
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who say the extent of the problem is exaggerated. The security industry has an ...
Tags: antivirus companies, Android malware threats, credibility issue
The next world war could feature cyber attacks, but not in the way that most people assume, according to the Symantec EMEA CTO Greg Day. Analysis: The era of geopolitical cyber wars Police prevented from chasing cyber criminals from ...
Tags: Symantec CTO, cyber attack, cyber security
Apple on Monday patched Java 6 for OS X, following Oracle's lead and quashing a browser plug-in vulnerability that hackers have been exploiting. Oracle issued the "out-of-band," or emergency, update for Java 6 and Java 7 to patch two ...
Romanian security company BitDefender today said it has traced the cyber-espionage malware "MiniDuke" back to June 2011, more than a year and a half before the campaign was uncovered. BitDefender found the malware by digging through its ...
Tags: BitDefender, MiniDuke, espionage malware
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Tags: Oracle, Emergency Fix, Java Vulnerabilities
China and India were the top two “victim” countries in the Asia Pacific, according to a recent Web threat report. Conducted by Web and mobile security firm Websense, the 2013 Threat Report also ranked Taiwan, Philippines, ...
Tags: China, India, victim countries, the Asia Pacific
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
A version of MiniDuke, the cyberspy malware aimed at governments and agencies in Europe and elsewhere, has been operating for at least 21 months, internet security firm Bitdefender has discovered. The newly discovered version also raises ...
Tags: MiniDuke, Computer Products
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies