September 23, 2016
Via: Computer WeeklyThe cyber attack on French television network TV5Monde in April 2015 was aimed at destruction, according to the network’s managing director Yves Bigot. Bigot was a member of a panel discussing how to defend businesses from cyber aggressors, which concluded […]
March 9, 2016
Via: TrendMicro BlogIn our 2015 predictions, “The Invisible Becomes Visible,” Raimund Genes, our Chief Technology Officer (CTO), said that in 2015 “Increased cyber activity will translate to better, bigger, and more successful hacking attempts.” Now that 2015 has passed, we can look […]
January 26, 2016
Via: Security IntelligenceAnyone who kept up with cyber-security news in 2015 already knows it was a big year for malware and the cyber-criminal gangs that develop it. Malware sophistication reached new heights with Dyre, Shifu and other gang-owned codes, revealing that the […]
Cyber-crime, Data loss, Editorial
December 30, 2015
Via: Russel EdwardsThis year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the […]
November 20, 2015
Via: Dark MattersIn a new DNS Threat Index report from Infoblox, in the third quarter of 2015, malicious domain creation for exploit kits increased 75 percent. This indicates that the command-and-control (C&C) infrastructure behind these kits exploded last quarter. The report stated […]
September 27, 2015
Via: virus-and-malwareAt this time of year I’m usually getting ready to travel to #virus bulletin, maybe the year’s most important #conference for an anti-#malware researcher. The agenda looks as good as ever, though, with a keynote from Ross Anderson to kick […]
September 9, 2015
Via: hacker#gemalto revealed that in the first six months of this year a total of 888 data #breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised […]
September 8, 2015
Via: hackerThe more things change, the more things stay the same — at least for hackers. That’s one of the finding in #proofpoint‘s mid-year threat report on the #attacks of choice for the first half of #2015. In addition to the […]
August 16, 2015
Via: vulnerabilitiesSecurity professionals are most concerned about the endpoint, citing it as the greatest source of risk in a Bromium survey of more than 100 pros who attended Black Hat USA 2015 in Las Vegas last week. That’s not surprising to […]
August 10, 2015
Via: featuredBlackhat and Defcon 2015 are being held in Las Vegas this year in the Mandalay Bay and Paris hotels, with 9,000 people in Blackhat attendance and more at Defcon. While attending Blackhat is far more expensive, you are almost assured […]
August 7, 2015
Via: threats-and-malwareA design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]
August 7, 2015
Via: vulnerabilitiesRecently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly that hack happened. At the start of their […]
August 5, 2015
Via: Russel EdwardsThe latest types of security exploits target connected cars and airplanes. Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since firewalls cannot offer the needed degree of […]
July 1, 2015
Via: malwareMore than 440,000 new strains of Android malware were discovered by security experts at G DATA analyzing data for the first quarter of 2015. That the company’s Q1 2015 Mobile Malware Report found so many strains of malware, representing a […]
April 17, 2024