The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks — “air-gapped” networks — and exfiltrate sensitive files from them through removable drives.
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.
That appears to be the lesson to learn from the latest attack on Chinese internet users.
Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country’s upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.
Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.
A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population – and an insight into a grim underworld dominated by fraud, violence and sexual abuse.
On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.
A hacking group has claimed that it has access to 6,937,081 Dropbox accounts with usernames and passwords, according to ZDNet. The first 400 log-in combinations were posted to Pastebin, with more to follow in return for payment in Bitcoin.
Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via the recently discovered Shellshock vulnerability in Bash.
The son of American wrestler Hulk Hogan has been the latest celebrity to fall victim to theft and publication of naked pictures on the internet, according to The Huffington Post.
JP Morgan Chase, one of the largest banks in America has admitted that a JP Morgan Chase data breach has affected 76 million customers, and seven million small businesses, the Guardian reports.
Basic phishing attacks and easily available tools are all that is needed to compromise many industrial control systems, the head of cybersecurity for the U.S. Department of Energy’s Strategic Petroleum Reserve has warned.
The creator of an app that secretly allows you to monitor another person’s smartphone usage without their knowledge has been arrested in Los Angeles, according to Slashgear.
This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.