Cyber Attacks

Making moves on the cyber chessboard

Making moves on the cyber chessboard

As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.

Cyber revenge is a dish best served by sharing threat data

By

At a gathering of security experts on Thursday in New York, panelists warned that while launching an offensive strike against cyber attackers might be a tempting response to being breached, there are better -- and legal -- strategies for retribution.

Officials preparing for cyber attacks, scams as Olympics nears

Officials preparing for cyber attacks, scams as Olympics nears

By

With the London Olympics set to kick off in July, U.S. security officials are warning about the event being a target for cyber criminals.

Botnets: The backdoor to the enterprise network

Botnets: The backdoor to the enterprise network

Compromising anywhere from a few thousand to well over a million systems, botnets are used by cyber criminals to take over computers and execute illegal and damaging activities.

What we learned from Anonymous/AntiSec

What we learned from Anonymous/AntiSec

An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.

Bounties keep reported bug count low, but severity high

By

Researchers are focusing on higher-risk vulnerabilities more than ever thanks to an increased interest in selling their finds to legitimate buyers.

IBM X-Force reports that mobile threats are increasing

By

While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.

China behind majority of cyber attacks, NSA says

By

The National Security Agency claims a dozen groups connected to China's People's Liberation Army and six nonmilitary groups connected to universities are largely behind cyber spying campaigns.

Recent attacks cost Energy Department at least $2M

By

The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.

Breaking the next case

Breaking the next case

By

Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.

Canadian intelligence warns of growing cyber-threat

By

The Canadian intelligence service has singled out cyber attacks as one of the biggest threats facing Canada in its latest annual report.

More public-private partnerships needed to fight terrorism

By

Canada's telecommunications networks are vulnerable to homegrown terrorists, concluded the Special Senate Committee on Anti-terrorism.

Cybercrime: Narrowing the gap

Cybercrime: Narrowing the gap

By

The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.

Hired Guns: What's in the name CyberPMC or CyberPSC?

In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?

Users should be wary of holiday malware, phishing

By

As the holiday season continues, users should be on high alert for scams such as malware-laden electronic greeting cards and screensavers, US-CERT has warned. In addition, phishing attacks may be disguised as requests for charitable donations, credit card applications and online shopping advertisements. US-CERT recommends that users avoid opening unexpected email attachments or following untrusted links. When donating to charities, individuals should verify the organization's authenticity with the Better Business Bureau. — AM

Exposed McDonald's data may be linked to third-party

By

Thefts of information belonging to customers of two major American chains may be traceable back to a breach at an email marketing services firm.

WikiLeaks attacks fail to meet definition of cyberwar

By

Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.

FBI warns of SMS and phone-based phishing scams

By

The FBI issued a warning on Wednesday about so-called "smishing" and "vishing" scams, which are likely to be prevalent this holiday season.

Scammers ready to pounce on Cyber Monday deal-hunters

By

Social networking sites and search engines are expected to be hit hard as cybercriminals try to wrangle in unsuspecting holiday shoppers.

Google quickly shores up Gmail spam flaw

By

Google has fixed what is being described as a serious security flaw that allowed a hacker to harvest Gmail addresses and send spam from the search giant's servers.

Senate debates DHS, reporting responsibility post Stuxnet

By

The Stuxnet worm has prompted lawmakers to consider imparting additional cyber-oversight on the Department of Homeland Security.

Lawmaker says attack against power grid will happen

By

The likelihood of a crippling cyberattack against the U.S. electric gird is 100 percent, a congresswoman said Wednesday at SC World Congress in New York.

Targeted, smarter attacks dominate 2010 threat landscape

By

According to an SC World Congress speaker, cybercriminals have over the past year grown more innovative and relied heavily on opportunistic, targeted and blended attacks.

Hacker accesses Louisiana EMT licensing database

By

An unauthorized individual recently gained access to a Louisiana state licensing database that contained the personal information of tens of thousands of emergency medical technicians (EMTs).

Stuxnet: Lessons not yet learned?

According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.

National security expert to address threat of cyberwar

National security expert to address threat of cyberwar

By

The cyberwar battlefield exists in every part of society in which we live and work, according to a national security expert who will be speaking at the third annual SC World Congress.

Stuxnet: Cyber warfare's game-changer, Part Two

Is Stuxnet cyber warfare's Trinity Test?

Stuxnet: Cyber warfare's game-changer, Part One

Is Stuxnet cyber warfare's Trinity Test?

More than half of critical infrastructure targeted

By

In the wake of the Stuxnet worm, a new survey found that 53 percent of critical infrastructure providers said their networks have experienced politically motivated attacks.

Microsoft exec proposes new internet "health" model

By

Governments, the IT industry and internet access providers should evaluate and ensure the health of consumer devices before allowing them full access to the internet, according to a Microsoft executive.

Sign up to our newsletters

POLL