Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...
CSO - In January 2010, Google shocked the cyber world by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China's People Liberation Army. "[We] have evidence to suggest ...
Tags: Computer Products
McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution,?wrote?McAfee's?Haifei Li in a ...
Tags: McAfee Spots, PDF-Tracking Flaw
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new advanced persistent threat (APT) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically a unit that goes under the cover name "Unit 61398." Security company Mandiant said in a report released Tuesday that an Advanced ...
Tags: Report, Cyberspying Group, China's Army
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
Security firm FireEye has claimed that a series of targeted malware attacks detected a year ago are almost certainly part of a Chinese campaign to steal industrial secrets from US companies working in the field of UAVs (Unmanned Aerial ...
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Cyber espionage is?nothing new.So a report from the Defense Security Service(DSS)about efforts in foreign countries to steal U.S.technology,intellectual property,trade secrets and proprietary information might sound like just more of the ...
Tags: Cyber espionage, DSS, Defense Industry
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Criminals broke into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. As a result of the breach, the company will revoke the certificate next Thursday and will update ...
Tags: Adobe, Criminal, cyber crime, highlightedpost, malware