Chinese Government's Link to Cyber Espionage Clearer Than Ever
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their...
View ArticleAdvanced volatile threat: New name for old malware technique?
AVTs are not widespread -- yet -- because 'APTs are working just fine,' says Triumfant CEO. But they could one day start a cyberwar, he said
View ArticleIT Concerns About Targeted Malware Rising
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
View ArticleTrend pitches Deep Discovery service to Australian customers
Trend Micro has given an overview of its Deep Discovery environment for Australian customers at its Evolve 2013 security conference in Sydney.
View ArticleSpear phishing paves road for Advanced Persistent Threats
Specialized spam can be more than it seems -- it sets up a beachhead for malware mischief
View ArticleSignature-Based Endpoint Security on Its Way Out
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide...
View ArticleGroup behind attack on New York Times linked to G20 phishing attack
Multiple groups are leveraging the upcoming G20 summit to launch Spear Phishing attacks, including the group responsible for attacking the New York Times
View ArticleAPT malware NetTraveler learning new tricks
Advanced Persistent Threat exploits Java vulnerabilities, embraces watering hole technique, says researcher
View ArticleEspionage campaign targeting Asian supply chains uncovered
Kaspersky Lab has released details on an espionage campaign active since 2011, which targeted organizations in Japan and South Korea, which are key elements to Western supply chains
View ArticleData encryption popularity breeding Aussie CSO overconfidence: Vormetric
Many security executives are getting a "false sense of security" in their data-encryption capabilities due to "primitive" solutions that leave private keys exposed to threats from insiders, Vormetric's...
View ArticleCosmicDuke will steal your login data and own your network
All malware is bad, but some malware is more insidious than others. That seems to be the case with CosmicDuke. According to a new white paper from F-Secure, CosmicDuke meshes elements of two notorious...
View ArticleHow hackers used Google in stealing corporate data
A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported.
View ArticleDetecting advanced threats with user behavior analytics
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
View ArticleMicrosoft tells Office users how to disable DDE after Fancy Bear attacks
Microsoft explains how to disable a protocol that attackers are using to install malware.
View ArticleStudy: Russia spends up big on hacking groups using unique code to protect...
Russia's lesson to hackers: different teams should avoid sharing code in espionage attacks.
View Article
More Pages to Explore .....