As a recent study finds that half of people plug in USB sticks found at their work’s car parking lot, we ask if the USB security threat will ever go away.
Search results for: "stuxnet"
David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.
It's a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers... imagine if you were responsible for the security of Britain's nuclear deterrent?
Time after time we have experienced revolutions in our societies, in the way we work and thus in the Industry. In the past we have been through several Industrial Revolutions and now it’s seems to be the time for another.
Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
An online attack on a German steelworks caused massive damage to the infrastructure, according to reports.
An Iranian hacker group has been breaching computer networks of 50 of the world's biggest energy, transport and infrastructure groups for the last two years, reports Tech Spot.
Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?
Basic phishing attacks and easily available tools are all that is needed to compromise many industrial control systems, the head of cybersecurity for the U.S. Department of Energy’s Strategic Petroleum Reserve has warned.
This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.
The billions of USB ports in use in PCs are vulnerable to a new attack - which can undetectably install malware, steal data and seize control of machines.
In Ubisoft's Watch Dogs, a man out for vengeance chooses an odd weapon - a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?
A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.
Major international cyber attacks follow a pattern - and attacks such as Stuxnet, which targeted Iran's nuclear plant can be predicted by a mathematical model, University of Michigan researchers have claimed.
Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered. Here we analyze a targeted attack used in Taiwan and Vietnam - but is this 'APT' really that advanced?
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.
Here's a brazen fake antivirus program that falsely declares you are infected, then locks your screen and asks you call a toll free number for Support, which then asks you to pay to remove the fake infection.
What does the New Year hold for information security, malicious software, consumer privacy and cybercrime? Questions of this mature are posed by journalists toward the end of every year and, beginning about November, answers from security specialists start to appear in print. Indeed, ESET researchers in Latin America published a 20-page white paper on this
USB flash drives continue to present a serious challenge to information security, for consumers and companies alike. You will be aware of this if you read our recent article on the Win32/Pronny worm, just one example of a piece of malicious software that is “in the wild” and actively seeking to spread via USB flash