Advertisement
Top

Tag: 2015


Cyber warfare

Cyber attack aimed at destruction, says TV5Monde

September 23, 2016

Via: Computer Weekly

The cyber attack on French television network TV5Monde in April 2015 was aimed at destruction, according to the network’s managing director Yves Bigot. Bigot was a member of a panel discussing how to defend businesses from cyber aggressors, which concluded […]


Data loss

2015: The Year Data Theft Got Real

March 9, 2016

Via: TrendMicro Blog

In our 2015 predictions, “The Invisible Becomes Visible,” Raimund Genes, our Chief Technology Officer (CTO), said that in 2015 “Increased cyber activity will translate to better, bigger, and more successful hacking attempts.” Now that 2015 has passed, we can look […]


Malware

Malware: Bigger and Badder Than Ever

January 26, 2016

Via: Security Intelligence

Anyone who kept up with cyber-security news in 2015 already knows it was a big year for malware and the cyber-criminal gangs that develop it. Malware sophistication reached new heights with Dyre, Shifu and other gang-owned codes, revealing that the […]


Cyber-crime, Data loss, Editorial

2015’s (cyber) seven – the most notorious data breach examples of the year

December 30, 2015

Via: Russel Edwards

This year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the […]


Cyber-crime

Cybercrime exploit kits are booming

November 20, 2015

Via: Dark Matters

In a new DNS Threat Index report from Infoblox, in the third quarter of 2015, malicious domain creation for exploit kits increased 75 percent. This indicates that the command-and-control (C&C) infrastructure behind these kits exploded last quarter. The report stated […]


Virus & Malware

Virus Bulletin 2015

September 27, 2015

Via: virus-and-malware

At this time of year I’m usually getting ready to travel to #virus bulletin, maybe the year’s most important #conference for an anti-#malware researcher. The agenda looks as good as ever, though, with a keynote from Ross Anderson to kick […]


Hacker

2015 saw 888 data breaches, 246 million records compromised worldwide

September 9, 2015

Via: hacker

#gemalto revealed that in the first six months of this year a total of 888 data #breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised […]


Hacker

4 new cybercrime trends threaten your business

September 8, 2015

Via: hacker

The more things change, the more things stay the same — at least for hackers. That’s one of the finding in #proofpoint‘s mid-year threat report on the #attacks of choice for the first half of #2015. In addition to the […]


Vulnerabilities

Black Hat 2015 attendees concerned about endpoint risks

August 16, 2015

Via: vulnerabilities

Security professionals are most concerned about the endpoint, citing it as the greatest source of risk in a Bromium survey of more than 100 pros who attended Black Hat USA 2015 in Las Vegas last week. That’s not surprising to […]


Cyber warfare, Hacker

Blackhat USA and Defcon 2015

August 10, 2015

Via: featured

Blackhat and Defcon 2015 are being held in Las Vegas this year in the Mandalay Bay and Paris hotels, with 9,000 people in Blackhat attendance and more at Defcon. While attending Blackhat is far more expensive, you are almost assured […]


Threats & Malware

Design flaw in Intel processors opens door to rootkits, researcher says

August 7, 2015

Via: threats-and-malware

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]


Vulnerabilities

Black Hat USA 2015: The full story of how that Jeep was hacked

August 7, 2015

Via: vulnerabilities

Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly that hack happened. At the start of their […]


Editorial, Security

Security Trends That Dominate 2015

August 5, 2015

Via: Russel Edwards

The latest types of security exploits target connected cars and airplanes. Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since firewalls cannot offer the needed degree of […]


Malware

More than 440K new Android malware strains found in Q1, study finds

July 1, 2015

Via: malware

More than 440,000 new strains of Android malware were discovered by security experts at G DATA analyzing data for the first quarter of 2015. That the company’s Q1 2015 Mobile Malware Report found so many strains of malware, representing a […]