Cyber Attacks

Remediate before it's too late

With mega breaches springing up one after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen.

Ohio student hacks school computer, shares data of 113 students

By

An Ohio student is under investigation for hacking into a school district server and sharing the information of at least one other student.

Russia and China form cyber alliance

By

Russia and Chiana have agreed to join forces stop not hack each other as well as to fight cyber attacks as well.

Netflix unveils threat detection management platform

By

Netflix announced on Monday the open source release of a threat detection management platform it has named FIDO.

India and Japan form cyber alliance

By

Indian officials met with a Japanese contingent last week to discuss how the two nations could work together to fight cyber crime and invest in India's IT sector.

EllisLab server hacked, passwords possibly compromised

EllisLab server hacked, passwords possibly compromised

By

EllisLab doesn't yet know who's responsible for hacking into its servers March 24 and potentially compromising customer information.

FBI investigating Rutgers University in DDoS attack

By

Rutgers and the FBI are collaborating to investigate a series of DDoS attacks against the university.

U.S. and Japan bolster cooperation to thwart cyber attacks

By

The United States and Japan have agreed to bolster their threat-sharing efforts, to thwart cyber attacks from China and North Korea, like state-sponsored intellectual property theft.

Russian hackers eyed in attack on White House, State Dept.

Russian hackers eyed in attack on White House, State Dept.

By

CNN has reported that Russian hackers used their intrusion into the State Department's systems as a way to get into White House systems.

Making moves on the cyber chessboard

Making moves on the cyber chessboard

As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.

Cyber revenge is a dish best served by sharing threat data

By

At a gathering of security experts on Thursday in New York, panelists warned that while launching an offensive strike against cyber attackers might be a tempting response to being breached, there are better -- and legal -- strategies for retribution.

What we learned from Anonymous/AntiSec

What we learned from Anonymous/AntiSec

An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.

China behind majority of cyber attacks, NSA says

By

The National Security Agency claims a dozen groups connected to China's People's Liberation Army and six nonmilitary groups connected to universities are largely behind cyber spying campaigns.

Recent attacks cost Energy Department at least $2M

By

The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.

Breaking the next case

Breaking the next case

By

Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.

Canadian intelligence warns of growing cyber-threat

By

The Canadian intelligence service has singled out cyber attacks as one of the biggest threats facing Canada in its latest annual report.

More public-private partnerships needed to fight terrorism

By

Canada's telecommunications networks are vulnerable to homegrown terrorists, concluded the Special Senate Committee on Anti-terrorism.

Cybercrime: Narrowing the gap

Cybercrime: Narrowing the gap

By

The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.

Hired Guns: What's in the name CyberPMC or CyberPSC?

In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?

Users should be wary of holiday malware, phishing

By

As the holiday season continues, users should be on high alert for scams such as malware-laden electronic greeting cards and screensavers, US-CERT has warned. In addition, phishing attacks may be disguised as requests for charitable donations, credit card applications and online shopping advertisements. US-CERT recommends that users avoid opening unexpected email attachments or following untrusted links. When donating to charities, individuals should verify the organization's authenticity with the Better Business Bureau. — AM

Exposed McDonald's data may be linked to third-party

By

Thefts of information belonging to customers of two major American chains may be traceable back to a breach at an email marketing services firm.

WikiLeaks attacks fail to meet definition of cyberwar

By

Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.

FBI warns of SMS and phone-based phishing scams

By

The FBI issued a warning on Wednesday about so-called "smishing" and "vishing" scams, which are likely to be prevalent this holiday season.

Scammers ready to pounce on Cyber Monday deal-hunters

By

Social networking sites and search engines are expected to be hit hard as cybercriminals try to wrangle in unsuspecting holiday shoppers.

Google quickly shores up Gmail spam flaw

By

Google has fixed what is being described as a serious security flaw that allowed a hacker to harvest Gmail addresses and send spam from the search giant's servers.

Senate debates DHS, reporting responsibility post Stuxnet

By

The Stuxnet worm has prompted lawmakers to consider imparting additional cyber-oversight on the Department of Homeland Security.

Lawmaker says attack against power grid will happen

By

The likelihood of a crippling cyberattack against the U.S. electric gird is 100 percent, a congresswoman said Wednesday at SC World Congress in New York.

Targeted, smarter attacks dominate 2010 threat landscape

By

According to an SC World Congress speaker, cybercriminals have over the past year grown more innovative and relied heavily on opportunistic, targeted and blended attacks.

Hacker accesses Louisiana EMT licensing database

By

An unauthorized individual recently gained access to a Louisiana state licensing database that contained the personal information of tens of thousands of emergency medical technicians (EMTs).

Stuxnet: Lessons not yet learned?

According to Iran, Stuxnet is no longer a threat - however use of a new zero-day exploit has extended its life cycle.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US