Click on a filter below to refine your search. Remove filter to broaden your search.
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Shamoon, malware that overwrites files to the point of making computers unusable, has been described as a targeted, yet damaging threat.
Last month's featured news from Shamoon attacking oil companies to Wyndham Hotels challenging the FTC.
A virus has reportedly shut down the energy company's website and email servers, giving rise to questions of whether the Shamoon virus is to blame.
Oil company Saudi Aramco has yet to confirm whether a virus, which struck 30,000 of its workstations, is Shamoon -- malware said to be targeting the Middle East energy sector.
Stuxnet kicked things off, and since then, there's been an explosion in sophisticated viruses targeting businesses and critical infrastructure in the Gulf region. But, prevention is still an option.
The Wiper virus has left few clues for researchers to study, but there may be similarities between it and other malware targeting systems in the Middle East.
McAfee's "2013 Threats Predictions" report also said that hacktivist group Anonymous would decline in success and visibility, with more extremist groups carrying the torch.
While the malware has targeted businesses in the Middle East and has capabilities reminiscent of other nation-state-backed malware, researchers believe Narilam is less of a threat than such viruses as Flame and Duqu.
Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.
Researchers at Symantec believe a trojan called "Jokra" was used in the attacks. Neighboring North Korea is considered a suspect, but there's no evidence suggesting it is to blame.
It's true: There are certain attacks that no security technology will be able to stop. But the situation isn't entirely hopeless. How organizations respond to an active threat can make all the difference in the world.
Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, the big question is: How will industry respond?