Nation-states are extricating intellectual property from U.S. government entities and private corporations, reports David Cotriss.
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
Stuxnet kicked things off, and since then, there's been an explosion in sophisticated viruses targeting businesses and critical infrastructure in the Gulf region. But, prevention is still an option.
The third and final presidential debate was heavy on the kinetic and light on the cyber. And it shouldn't have surprised anybody.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
Researchers have discovered three new malware strains linked with the Flame virus, and noted an even higher number of victims than expected.
Experts said the light patch load addresses issues that aren't considered high-risk, but the monthly update from Microsoft also includes a new requirement that encryption algorithms on RSA certificates meet a certain key length.
Next week's monthly patch batch from Microsoft is not very burdensome, but it includes a new requirement that certificates must contain RSA key lengths of more than 1,024 bits.
Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news
The Wiper virus has left few clues for researchers to study, but there may be similarities between it and other malware targeting systems in the Middle East.
In the high-priced market of exploit sales, developers resist government regulations -- but are more than happy when one wants to open its coffers to them.
Shamoon, malware that overwrites files to the point of making computers unusable, has been described as a targeted, yet damaging threat.
Though Gauss's encrypted payload continues to perplex researchers, Kaspersky Lab has unveiled a free tool to detect the malware.
Gauss, which researchers have linked to Flame and Stuxnet, both believed to be built by the U.S. government, functions mainly as a banking trojan -- but it also contains a mystery encrypted payload.
The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.
Security researchers said Tuesday they have come across a new strain of espionage malware that has successfully infected 800 different organizations this year in the Middle East to steal information and spy on communications.
The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.
Flame, Stuxnet, breach at LinkedIn and other security news
While the characteristics of the spy virus are important to note, the question is why it went undetected for so long.
The espionage toolkit known as Flame has sparked widespread awe over its capabilities. But at least some researchers already have exhibited how malware can disguise itself as a software update to infect computers.
Suspicions that the sophisticated espionage toolkit Flame was created by the same authors as Stuxnet are true, according to a published report.
Does the fact that the Flame malware stayed below the radar for so long prove that signature detection is dead?
Illegitimately signed Microsoft certificates were used to help spread the nefarious Flame malware, another sign detailing just how sophisticated the espionage toolkit is.
The National Security Agency, working with Unit 8200, a part of Israel's military, developed the worm to sabotage Iran's nuclear program.
While the investigation is just beginning into the massive espionage toolkit known as Flame, which has targeted computers, mainly in Iran, it is important to consider the consequences of this malware.
The complex Flame espionage toolkit shows efforts to gather intelligence on certain countries is in high gear, but the malware's functionality may not be all that different from what already is on the scene.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Syrian Electronic Army redirects Gigya, briefly compromises media sites on Thanksgiving Day
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say