Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company
With an eye for better serving big data projects, Oracle and partner Fujitsu have commenced building the next generation of Sparc64 processors, in a project called Athena. The new design will feature a number of new features, including a ...
Tags: big data projects, Oracle, Fujitsu, Sparc64 processors, Athena
Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Mobile security and BYOD (bring your own device) ...
Tags: BYOD, mobile security, RSA, security conference
VMware and EMC today confirmed rumors that have been circulating for weeks that it would spin out its big data and platform as a service (PaaS) cloud products into a new division within the company named Pivotal Initiative, which will be ...
Tags: VMware, EMC, big data, PaaS, cloud division
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
The creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malware together with custom scripts that would allow cybercriminals to target U.S. online ...
Tags: Carberp Malware, Banks, Computer Products
Google's decision last week to put its Google Wallet e-wallet system into the cloud is not sitting comfortably with security experts. Though the service's move from physical handsets to the cloud has expanded its credit card compatibility ...
Tags: Google, Google Wallet, cloud, security experts
EMC said today it has agreed to buy privately-held start-up Silver Tail Systems, a vendor of real-time web session intelligence and behavioural analysis. EMC plans to use the purchase to beef up its RSA security division in the rapidly ...
Tags: EMC, Silver Tail, web intelligence, Silver Tail Systems
IDG News Service - Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said. A cybercriminal using the ...
Tags: Computer Products, Credible Threat, Mcafee, Blitzkrieg E Banking Heist
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Kaspersky Lab today appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware. "We are asking anyone interested in cryptology and ...
Tags: Kaspersky, cryptographers, encryption, malware
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
Hood Group unit Select and Protect has selected RSA to serve as underwriter for its Ultima home insurance product. RSA personal lines broker managing director Jill White said, "A key part of our strategy is to work with chosen partners ...
Tags: Hood Group, home insurance, insurance product, insurance
A cyber gang thought to be based in Eastern Europe and the former Soviet Union is recruiting dozens of people to participate in a scheme to steal millions of dollars from 30 major U.S. banks, according to RSA. The organisers are thought ...
Tags: cyber crime, cyber criminals, highlightedpost, Trojan, banks
In a Q&A with press at the RSA European conference today,RSA executive chairman Art Coviello revealed how criminals and nation states are working together to launch cyber attacks. Further reading RSA:No successful attacks on customers ...
Tags: cyber attack, RSA, predictive analytics, information sharing