For four days in March, attackers launched cyber assault on Iran's oil ministry but were rebuffed by country's Cyber Police (FATA).
This month's news briefs cover a preliminary settlement Sony will bear for the exposure of 77 million customers, and more.
The campaign targets Spanish speaking victims, which also appears to be the native language of attackers.
Gamma International distributes FinFisher, spyware allegedly used to target dissidents in nations overseas.
In a continuing effort to move away from U.S. products in favor of homegrown technology, China has removed Apple products from its procurement list.
China has removed Kaspersky and Symantec from its list of approved security vendors and approves five domestic antivirus brands.
A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.
Sentinel Labs dubbed the repurposed malware "Gyges."
TrapX was alerted to the zero-day attack when the malware targeted servers with "finance" in their host names.
Chinese hackers broke into databases at the Office of Personnel Management which house data on workers applying for top-secret security clearance.
A variant of espionage malware that plagued government entities and other organizations across the globe has returned with a new toolset and a different set of victims.
CrowdStrike revealed that the attack group is now targeting sensitive data about political affairs in Iraq.
Symantec's report on the "Dragonfly" group brings additional insight on attackers spreading Havex malware.
F-Secure detected 88 variants of the malware, which infected companies in Europe, as well as a California firm.
HackingTeam is an Italian seller of hacking software marketed to police and governments.
CrowdStrike revealed that the spy network "Putter Panda" appears to share resources with the infamous espionage group APT1.
A report from the Center for Strategic and International Studies puts a dollar figure on cybercrime costs but shows wider economic fallout.
iSight Partners detailed the elaborate social engineering scheme used to target senior military and government officials in the U.S.
The government may impose visa restrictions on Chinese nationals who are scheduled to attend the upcoming Black Hat and DefCon security conferences.
Five members of the People's Liberation Army were indicted for stealing trade secrets from several large U.S. companies including Alcoa.
According to Trend Micro, the public sector has remained a top target of cybercrime.
Attacks by the Ajax Security Team, and other Iranian groups, have grown in sophistication from website defacement to politically motivated cyber espionage.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
While China continued to lead cyber espionage activity against organizations, Eastern Europe accounted for more than 20 percent of related incidents, according to an annual data breach report.
Recent Snowden leaks allege that the NSA targeted Chinese telecom firm Huawei for corporate data, including product source code.
On Wednesday, FireEye revealed research linking the Chinese-based attack group APT1 to those behind the Siesta campaign.
Proprietary information, including technical data, from Japanese companies was allegedly leaked to rivals.
Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.
Researchers at FireEye found that the U.S. Veterans of Foreign Wars site was booby trapped to spread a backdoor.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Report: Phishing costs average organization $3.7 million per year
- Women in IT Security: Women of influence