Dusting for Cyber Fingerprints: Coding Style Identifies Anonymous Programmers
February 27, 2015
A team of computer scientists, led by researchers from Drexel University’s College of Computing & Informatics, have devised as way to lift the veil of anonymity protecting cyber criminals by turning their malicious code against them.
Continue reading…
Serious TalkTalk data breach leads to scam phone calls for customers
February 27, 2015
Hackers have stolen the personal details of thousands of TalkTalk customers, and – in some cases – used them to scam further information such as sensitive banking information.
Continue reading…
Iran Behind Cyber-Attack on Adelson’s Sands Corp., Clapper Says
February 26, 2015
The top U.S. intelligence official confirmed for the first time that Iran was behind a cyber attack against the Las Vegas Sands Corp. last year.
Continue reading…
How Hackers Can Hijack Your Website And Read Your Email, Without Hacking Your Company
February 26, 2015
Imagine coming into the office one day, and finding that visitors to your website are not only seeing messages and images posted by hackers, but that the attackers are also posting screenshots of private emails sent to your company on Twitter.
Continue reading…
Arab hackers go running after Trend Micro Report
February 26, 2015
Arab hackers in Egypt and Palestine seem to have gone underground after a report surfaced on their activities by security vendor Trend Micro.
Continue reading…
North America gets ready for Oil and Gas Cyber Security 2015: leading cyber security experts to meet in Houston in May
February 26, 2015
FBI, Chevron Information, State of Texas, Newfield Exploration Company, NOV to present at Oil and Gas Cyber Security North America in Houston, USA.
Continue reading…
How the Sony Pictures attack changed the rules of cybersecurity
February 25, 2015
In IT, game changers don’t come along very often but when they do, they impact just about everybody.
Continue reading…
Wall St. and Law Firms Plan Cooperative Body to Bolster Online Security
February 23, 2015
The threat of ever-larger online attacks is bringing together Wall Street banks and the big law firms that do work for them in an alliance that could result in some sharing of basic information about digital security issues.
Continue reading…
White House Includes Apple Pay in Cybersecurity Initiative
February 23, 2015
Earlier this month the White House held the White House Cybersecurity Summit at Stanford University.
Continue reading…
How the “Great SIM Heist” could have been avoided
February 23, 2015
You may very well have read about the latest leak supposedly sourced from the secret data stolen by whistleblower Edward Snowden.
Continue reading…
SSL-busting code that threatened Lenovo users found in a dozen more apps
February 22, 2015
The list of software known to use the same HTTPS-breaking technology recently found preinstalled on Lenovo laptops has risen dramatically with the discovery of at least 12 new titles, including one that’s categorized as a malicious trojan by a major antivirus provider.
Continue reading…
Document Reveals Growth of Cyberwarfare Between the U.S. and Iran
February 22, 2015
A newly disclosed National Security Agency document illustrates the striking acceleration of the use of cyberweapons by the United States and Iran against each other, both for spying and sabotage
Continue reading…
Kaspersky Lab: Israel spared two major cyberattacks
February 22, 2015
Software security firm says the Equation Group hacking operation is by far the most sophisticated malware it has uncovered, and the most dangerous; also discovers mega cyber robbery plot.
Continue reading…
Revelation of Secret Spyware Could Hamper US Espionage Efforts
February 21, 2015
The revelation of secret technology that buries spyware into computer hard drives could be a blow to espionage efforts by the U.S. National Security Agency, intelligence analysts say.
Continue reading…
KIDEC 2015, 15-19 November 2015, Camp Doha, Kuwait – PRESS RELEASE
February 20, 2015
At Camp Doha, near Kuwait City, on the 15-19 November 2015, under the official patronage of the Kuwait Prime Minister, Deputy Prime Minister and the Minister of Defense, will commence the first biannual Kuwait International Defense Exhibition and Conference (KIDEC).
Continue reading…
US and UK accused of hacking Sim card firm to steal codes
February 20, 2015
US and British intelligence agencies hacked into a major manufacturer of Sim cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says.
Continue reading…
Vital Payments Security Method at Heart of Gemalto Hack Investigation
February 20, 2015
The apparent hack of Gemalto by U.S. and U.K. spies casts doubt over several security measures vital to the payments industry as it embraces chip cards and adopts digital payments.
Continue reading…
ENISA Calls For New ICS/SCADA Cybersecurity Certification Programs
February 19, 2015
The European Union Agency for Network and Information Security (ENISA) has published a new study on the challenges of developing certification schemes for cybersecurity professionals in the field of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA).
Continue reading…
Trend Micro: Arid Viper Could be the Start of Something Big
February 18, 2015
Security researchers have uncovered two interconnected Middle East attack campaigns of very different skill levels aimed at stealing sensitive information from Israeli and Egyptian targets.
Continue reading…
Your hard drives were riddled with NSA spyware for years
February 17, 2015
The US National Security Agency (NSA) infected hard disk firmware with spyware in a campaign valued as highly as Stuxnet that dates back at least 14 years and possibly up to two decades – all according to an analysis by Kaspersky Labs.
Continue reading…
Cyber bank robbers steal $1bn, says Kaspersky report
February 16, 2015
Up to 100 banks and financial institutions worldwide have been attacked in an “unprecedented cyber robbery”, claims a new report.
Continue reading…
Cybercrime moves from server room to the boardroom
February 16, 2015
Cybersecurity analysts have for years lamented that banks weren’t paying sufficient attention to the threat posed by online attacks. Now, after a slew of high-profile breaches, it seems bank chief executives are taking note.
Continue reading…
Government approves national cyber security strategy
February 16, 2015
The Czech cabinet yesterday approved a national cyber security strategy for the next five years, which counts with deeper cooperation between the state and the private sector, including a system of sharing the information concerning threats, incidents and current dangers.
Continue reading…
Cyber attack the top threat according to business continuity professionals
February 14, 2015
Cyber-attack is the top threat perceived by businesses, according to the fourth annual Horizon Scan report published today by the Business Continuity Institute (BCI), in association with BSI.
Continue reading…
Report: PlugX Is RAT of Choice for Nation States
February 13, 2015
Nation-state backed threat adversaries have their own preferences when it comes to malware and attack tools.
Continue reading…
Visa, MasterCard to Roll Out New Cybersecurity Features
February 13, 2015
Visa Inc. and MasterCard Inc. _are taking long-awaited next steps to ramp up security of customer data as concerns over cyberattacks continue to mount.
Continue reading…
Anthem data breach cost likely to smash $100 million barrier
February 12, 2015
The financial consequences of Anthem’s massive data breach could reach beyond the $100 million mark, according to reports.
Continue reading…
Innovative security solutions to headline INTERPOL World Congress
February 11, 2015
Technology-driven security solutions developed by leading industry players will be presented at the INTERPOL World Congress, a knowledge sharing forum anchoring the inaugural INTERPOL World in 2015.
Continue reading…
Senate Report Slams Automakers for Leaving Cars Vulnerable to Hackers
February 11, 2015
Since hackers first began demonstrating that they could take over cars’ digital systems to slam on brakes or hijack steering, most automakers have done everything they can to avoid publicly discussing whether their vehicles are vulnerable.
Continue reading…
How Malware Bypasses Our Most Advanced Security Measures
February 10, 2015
We unpack three common attack vectors and five evasion detection techniques.
Continue reading…
Why small firms struggle with cyber security
February 6, 2015
Keeping cyber thieves at bay is hard. They are busy, well-motivated and well-financed.
Continue reading…
U.S. health insurer Anthem hit by massive cybersecurity breach
February 5, 2005
Hackers have stolen personal information relating to current and former customers and staff of no. 2 U.S. health insurer Anthem Inc., after breaching an IT system containing data on up to 80 million people, the company said late on Wednesday.
Continue reading…
Obama seeks $14 billion to boost U.S. cybersecurity defenses
February 2, 2015
President Barack Obama’s <budget proposal for the 2016 fiscal year seeks $14 billion (9 billion pounds) for cybersecurity efforts across the U.S. government to better protect federal and private networks from hacking threats.
Continue reading…
Cyber security minister Francis Maude steps down as MP
February 2, 2015
Cabinet Office minister for cyber security and G-Cloud, Francis Maude, has announced plans to step down, arguing that it is time for a younger candidate to lead.
Continue reading…