Nation-states are extricating intellectual property from U.S. government entities and private corporations, reports David Cotriss.
NBC News reported Thursday night that four-star retired Gen. James 'Hoss' Cartwright, who was once the second-highest ranking U.S. officer and who retired in August 2011, has been under investigation since late last year.
Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.
The FBI and DoJ are targeting high-level U.S. officials in hopes of learning who released classified information about Stuxnet to the press. What the government is not doing is publicly explaining why it launched Stuxnet.
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
Stuxnet kicked things off, and since then, there's been an explosion in sophisticated viruses targeting businesses and critical infrastructure in the Gulf region. But, prevention is still an option.
The third and final presidential debate was heavy on the kinetic and light on the cyber. And it shouldn't have surprised anybody.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
Researchers have discovered three new malware strains linked with the Flame virus, and noted an even higher number of victims than expected.
The Wiper virus has left few clues for researchers to study, but there may be similarities between it and other malware targeting systems in the Middle East.
In the high-priced market of exploit sales, developers resist government regulations -- but are more than happy when one wants to open its coffers to them.
Gauss, which researchers have linked to Flame and Stuxnet, both believed to be built by the U.S. government, functions mainly as a banking trojan -- but it also contains a mystery encrypted payload.
The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.
Flame, Stuxnet, breach at LinkedIn and other security news
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.
While the characteristics of the spy virus are important to note, the question is why it went undetected for so long.
Suspicions that the sophisticated espionage toolkit Flame was created by the same authors as Stuxnet are true, according to a published report.
Does the fact that the Flame malware stayed below the radar for so long prove that signature detection is dead?
The National Security Agency, working with Unit 8200, a part of Israel's military, developed the worm to sabotage Iran's nuclear program.
While the investigation is just beginning into the massive espionage toolkit known as Flame, which has targeted computers, mainly in Iran, it is important to consider the consequences of this malware.
The complex Flame espionage toolkit shows efforts to gather intelligence on certain countries is in high gear, but the malware's functionality may not be all that different from what already is on the scene.
Just when you thought all of the windows that control system recon trojan Duqu used to propagate had been roped off, the software giant releases a new set of fixes.
The year's first variant of the notorius W32.Duqu, a trojan that seems intended for cyber war, has been discovered by Symantec researchers.
Hacker groups Anonymous and LulzSec have made a name for themselves by scanning large organizations until they find the one weak system ready to be exploited. You can prevent an attack.
Stealthy, targeted attacks are real -- as evidenced by operations such as Shady RAT and Stuxnet -- and there isn't a one-size-fits-all remedy to deal with them.
On Oct 20, just two days after researchers released details about the Duqu malware, its creators scrubbed all the files from their command-and-control servers in an effort to conceal their identity.
The Hungary-based research lab responsible for detecting the Duqu trojan has released a toolkit to find traces of the trojan on a computer or in a whole network.
Three U.S. Air Force information security experts, independent of their role in the military, studied the Duqu trojan, and you might be surprised by what they found. This is the second article in a two-part series that examines the sophisticated threat that everyone is talking about.
Microsoft on Tuesday patched one "critical" vulnerability, plus three other less-severe flaws. Not patched, as expected, is a bug related to the Duqu trojan.