Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

0intro title
Hillary Clinton

150817 google marshmallow 04

To scare people better, Android ransomware gets a snazzy UI

Hackers are like any other coders: they want to built better software, even if it's a program that merely aims to extract a ransom from a hapless Android user.

doctor ipad healthcare

Too many healthcare employees complacent about security

Non-technical health care employees are too complacent about the possibility of a data breach, and few are aware that it has happened to their organizations, according to a survey released today of employees at large and mid-sized...


Advertising network takes on malvertisers

In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads on otherwise reputable sites, infect target users and disappear --...

Eye-catching cloud solutions

Application attacks against clouds up 45%

Application attacks against clouds jumped 45 percent last year, according to a new report

News Corp

Dow Jones & Co. discloses breach, incident likely related to Scottrade

On Friday, in a letter to customers, the CEO of Dow Jones & Co. disclosed a data breach affecting 3,500 people. Based on public details, the incident seems similar to a breach reported by Scottrade last week that impacted 4.6 million...

samsung pay

Hackers who targeted Samsung Pay may be looking to track individuals

The security breach at Samsung subsidiary LoopPay was probably more about spying than about gathering consumer data for profit, and the worst could be yet to come, a security analyst said Wednesday.

donald trump

Donald Trump is silent on cybersecurity

The Republican frontrunner has nothing to say (yet) about cybersecurity.


Journalist convicted of helping Anonymous hack the LA Times

A journalist accused of helping a rogue hacking group briefly take control of the LA Times' website was convicted by a federal jury in California on Wednesday.

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?

signs arrow confused

Quarter of firms can't tell how hackers get in

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know how the hackers got in, according to a new survey.

poseidon statue

5 myths that will thwart any security strategy

We have to stop relying on outdated and unsupported information. Crafting successful (business driven) security strategy relies upon being accurately informed.

iphone6 camera

Chinese hackers put iOS in the crosshairs with novel attack angles

For nearly a year, Chinese hackers have used a novel one-two punch to compromise iOS devices.

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.

Average business spends $15 million battling cybercrime

The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year.

flash update

Encrypted Flash exploit bypassing vector mitigations

Researchers at Morphisec, have discovered a clever bypass being used by the Nuclear exploit kit when it targets CVE-2015-5560.

092315blog carly fiorina debate

Carly Fiorina on U.S. cyber defense

Republican Presidential candidate Carly Fiorina on cybersecurity

login prompt security screen

Dyreza malware steals IT supply chain credentials

New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.

jinping obama

IP protection: Don’t expect government help

While the U.S. and Chinese presidents agreed last week that their governments won’t conduct or “knowingly support” economic cyber espionage to give companies a competitive advantage, experts say that still leaves the field open to...

Load More