The Chinese government and military are behind large numbers of cyberespionage attacks directed at U.S. government computer systems, according to a Pentagon report released this week.
This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.
Pre-school children should learn to get to grips with technology and its problems, argues David Harley, ESET Senior Research Fellow.
We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive “other than its modified httpd binary” which can be scanned for detection in several ways.
Users of popular PC gaming service ESEA have discovered that their PCs have been hijacked to mine Bitcoins by malware served up alongside the company’s client. A hidden Bitcoin-mining process caused users’ graphics cards to overheat as it worked in the background.
The mysterious Avatar rootkit, detected by ESET as Win32/Rootkit.Avatar, appears to reflect a heavy investment in code development, with an API and a SDK available, plus an interesting abuse of Yahoo Groups for C&C communications.
Twitter has warned media companies that attacks on their official Twitter accounts are liable to continue, after Britain’s Guardian newspaper became the latest high-profile news site to fall victim.
Daily deals site LivingSocial has become the latest high-profile site to fall victim to hackers, after an attack accessed information for 50 million accounts last week.
Analysis of a malicious backdoor serving Blackhole exploit pack found on Linux Apache webserver compromised by malware dubbed Linux/Cdorked.A, together with remediation tool and techniques.
Twitter is said to be testing new security systems in the wake of a false Tweet from an official Associated Press account which sent stock markets tumbling in America.
Most cyber attacks are simple and predictable, relying on basic tactics and preventable employee errors, according to Verizon’s annual Data Breach Investigations Report. The problem is made worse by the fact that companies often take months or even years to detect such breaches.
Twitter accounts used by CBS News were compromised on Saturday – and began serving up bogus news stories with links to malware.
A three-day “cyber war” ended in victory for a team from the U.S. Air Force Academy, who beat off attacks from hackers from the National Security AGency in the 13th annual Cyber Defense Exercise (CDX).
The Cyber Intelligence Sharing and Protection Act (CISPA) passes the U.S. House despite privacy concerns and the threat of presidential veto.
Here’s a brazen fake antivirus program that falsely declares you are infected, then locks your screen and asks you call a toll free number for Support, which then asks you to pay to remove the fake infection.
A quarter of PCs around the world have no antimalware software, according to Microsoft’s latest Security Intelligence Report.
Up to 2.4 million credit cards may have been compromised after St. Louis grocery chain Schnucks was targeted with malware, the chain revealed this week.
China and the U.S. have agreed to work together on cyber security, with the two countries setting up a working group to deal with the issue, U.S Secretary of State John Kerry said on Saturday in Beijing.
An Oregon farm products company is suing its own bank to recover losses after a phishing attack saw $223,500 transferred to accounts in the Ukraine over a period of three days in 2010.
Technology companies including Cisco and IBM are backing an Open Group programme to protect computer hardware from threats such as spyware added to components in the supply chain.