Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
Snowden serves up another lesson on insider threats
The Edward Snowden saga continues to serve up valuable lessons on the dangers posed to enterprise data by insiders with privileged access to systems and networks. The latest lesson involves the risks of allowing password sharing among employees.
China-based hacking group behind hundreds of attacks on U.S. companies
A group of between 50 and 100 professional hackers operating out of China has been systematically targeting businesses, military and government agencies around the world since at least 2009, security vendor Symantec said in a report released on Tuesday.
China suffers major DDoS attack on .cn domain
China’s Internet on early Sunday morning suffered a major distributed denial of service (DDoS) attack that briefly disrupted and slowed …
If governments ban China-based Lenovo, should companies?
If US intelligence agencies ban the computers of a Chinese company from classified networks should companies also avoid the same products? What if the vendor is one of the world’s largest PC makers?
Picky spyware ranks sensitive military documents
A noisy malware campaign against South Korea is revealing deeper secrets.
Many companies are negligent about SAP security, researchers say
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.
Researchers find more versions of digitally signed Mac OS X spyware
Security researchers have identified multiple samples of the recently discovered “KitM” spyware for Mac OS X, including one dating back …
Target located
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to …
Chinese hackers resume attacks on U.S. targets
For the last three months or so, the U.S. government and some of its defence contractors have engaged in a …
Three alternatives to Adobe Reader
Another day, another critical security exploit discovered for Adobe Reader. The PDF software’s near-ubiquitous presence has made it a big, fat, …
Top 10 tech stories of 2012
Change in any industry involves conflict. Evolution and revolution in tech this year took place not only in the marketplace …
Symantec spots odd malware targeting Iran
Symantec has spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with …
IT's 9 biggest security threats
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …
Gov surveillance malware monitors Middle East accounts
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was ‘probably’ built by or …
Honeynet Project tackles USB-carried malware like Flame
A nonprofit security research group is building technology to trap malware spread from PC to PC via USB storage drives, …
Flame's Windows Update hack required world-class cryptanalysis, researchers say
The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts …
Google warns users of 'state-sponsored' hacks
Google began warning users today of its Gmail online email services when it suspects they may be targets of “state-sponsored” …
Middle East engulfed by 'Flame'
A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has …
Fulfilling the prophecy
In Mexico I learnt that the world will NOT end in 2012 yet I’m not so optimistic about the state of cyber security.