Cyber Threat

U.S., Australia vow to take on ISIS cyberthreat together

U.S., Australia vow to take on ISIS cyberthreat together

By

Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.

Ransomware and POS attackers to zero in on small businesses, retailers

Ransomware and POS attackers to zero in on small businesses, retailers

By

Small businesses and retailers should expect cybercriminals to pay extra attention to them in the coming months with ransomware and point of sale attacks becoming even more common.

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

By

Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.

Not so fast, was OS X really the most vulnerable of 2015?

Not so fast, was OS X really the most vulnerable of 2015?

By

Researchers at Malwarebytes challenge claims the Mac OSX had the most vulnerabilities in 2015.

South Korea boosts cyberdefenses against the DPRK

South Korea boosts cyberdefenses against the DPRK

By

In the wake of North Korea testing a nuclear device earlier this week, the South Korean military has raised its cybersecurity level as a precautionary measure.

BIMCO releases first cybersecurity guidelines for shipping industry

BIMCO releases first cybersecurity guidelines for shipping industry

By

BIMCO today introduced the first set of cybersecurity guidelines for the global shipping industry to help prevent cyber incidents at sea.

Tech support scammers using Rackspace to help ply their trade

Tech support scammers using Rackspace to help ply their trade

By

Tech support scammers have found a new online base of operations to push their particular breed of malware moving to Rackspace from Amazon Web Services.

Researchers bring encryption-defying quantum computers one step closer

Researchers bring encryption-defying quantum computers one step closer

By

Two different groups of researchers at National Institute of Standards and Technology and the University of Oxford published research that puts the encryption-breaking potential of quantum computers one step closer to reality.

Joomla! New Version Fixes Security Flaws

Joomla! New Version Fixes Security Flaws

By

Joomla! has released the latest version, 3.4.7, of its free content management system software to address two reported security vulnerabilities.

DDoS attacks up 180 percent in Q3 2015: Akamai

DDoS attacks up 180 percent in Q3 2015: Akamai

By

Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.

How to prepare for the inevitable: SC Roundtable sponsored by FireEye Mandiant

How to prepare for the inevitable: SC Roundtable sponsored by FireEye Mandiant

No one wants to plan for a breach, but its what you ought to do if you want to minimise the costs, data losses and reputational damage when the inevitable happens, hence the avid pre-planning at last week's SC roundtable.

'Devastating flaws' in Kerberos authentication protocol

'Devastating flaws' in Kerberos authentication protocol

Security watchers warn of authentication and authorisation flaws in Windows network environments

Phony 'Steam escrow' site used to deliver malware

Phony 'Steam escrow' site used to deliver malware

By

Researchers at Malwarebytes spotted a phony CSGO Shuffle site that delivers malware to unsuspecting Steam users.

Kalahari Resorts hit by POS breach

By

Wisconsin Dells, Wis.-based Kalahari Resorts announced that its Ohio and Wisconsin resorts were hit by a point-of-sale (POS) breach.

Ransomware Chimera is back, offering victims commission

Ransomware Chimera is back, offering victims commission

By

Researchers at Trend Micro spotted the ransomware Chimera in the wild offering victims a commission.

Cryptowall 4.0 spotted in nuclear exploit kit

Cryptowall 4.0 spotted in nuclear exploit kit

By

Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.

Cyber and real war come together in the Ukraine

Cyber and real war come together in the Ukraine

By

The future of warfare where a cyber component is added to the traditional land, air and sea battles can be seen in the Ukraine as it struggles to fend off cyber groups determined to undermine their war against Russian-backed separatists.

House Oversight Committee gives failing grades on cybersecurity progress

House Oversight Committee gives failing grades on cybersecurity progress

By

The results of the first FITARA scorecard are in, and it doesn't look good. The Government Accountability Office reviewed 24 government agencies on their progress implementing federal IT reforms.

Jaguar car hack in New Zealand

Jaguar car hack in New Zealand

A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.

Mozilla may reject SHA-1 certificates six months early

Mozilla may reject SHA-1 certificates six months early

By

Mozilla has stepped up pressure on enterprise companies that continue to use SHA-1 certificates after research last month demonstrated the algorithm could be broken in as little as three months.

Consumers oddly confident in their cybersecurity, even as their data is stolen

Consumers oddly confident in their cybersecurity, even as their data is stolen

By

Most Americans hold the false belief that they have a firm grip on their home network's security level and children's internet activities even though they have taken few steps to ensure that this is true.

Akhter twins sentenced to prison for hacking State Dept.

Akhter twins sentenced to prison for hacking State Dept.

By

Twin brothers Muneeb and Sohaib Akhter were sentenced to prison by the Eastern District of Virginia for an array of offenses, including conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization, conspiracy to access a government computer without authorization, and obstruction of justice.

Senators' bill demands strategy to fight North Korean cyberattacks

Senators' bill demands strategy to fight North Korean cyberattacks

By

A trio of Republican senators, including presidential candidate Marco Rubio, R-Fla., have introduced the North Korean Sanctions and Policy Enhancement Act of 2015 that would sanction the Hermit Kingdom for cyberattacks on the U.S..

Cyber danger to nuclear power plants growing

Cyber danger to nuclear power plants growing

By

Civilian nuclear power facilities may be more susceptible to cyber attack than the public generally realizes, according to a report by the London-based think tank Chatham House.

Don't spend more, spend better: Interview with FireEye's Richard Turner

Don't spend more, spend better: Interview with FireEye's Richard Turner

FireEye's EMEA president, Richard Turner discusses its new Advanced Threat Report

Big data offers cyber-attack early warning

Big data offers cyber-attack early warning

Analysis of big data in real time provides a granularity of insight into normal network behaviour, allowing earlier identification of abnormal behaviour.

Security researcher reveals Kaspersky zero days

Security researcher reveals Kaspersky zero days

A security researcher at Google has discovered more zero-day exploits in Kaspersky's anti-virus software.

Fatal exception crashes Google Chrome in sixteen characters

Fatal exception crashes Google Chrome in sixteen characters

If you see this code and you are using Google Chrome, don't click it, type it in, copy it or even hover your mouse over it http:// a /%%30%30

Amazon UK customers targeted with phishing scam

Amazon UK customers targeted with phishing scam

By

Researchers at Malwarebytes spotted an email phishing scam on Wednesday that targets Amazon users in the UK.

U.S. Air Force developing airborne hacking platform

U.S. Air Force developing airborne hacking platform

By

The U.S. Air Force (USAF) is looking to expand its traditional electronic countermeasures capability to include the ability to carve into an enemy's computer network from the air.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US