DDoS attacks that crippled GitHub linked to Great Firewall of China
Earlier this week came word that the massive denial-of-service attacks targeting code-sharing site GitHub were the work of hackers with control over China’s Internet …
New malware used to attack energy companies
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector. The program, dubbed Trojan.Laziok by …
Stealing Data From Computers Using Heat
AIR-GAPPED SYSTEMS, WHICH are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in …
A network error routed traffic for the UK’s nuclear weapons agency through Russian telecom
For the past week, something strange has been going on in the European internet. For five days, web traffic from Texas to certain addresses …
Researchers investigate link between Axiom spy group, Anthem breach
When news of the Anthem breach first surfaced, investigators claimed that malicious tools, linked exclusively to Chinese cyber attackers, were used against the health …
Hackers make off with at least $300 million in bank heists
A group of cybercriminals used malicious software to steal at least $300 million from banks and other financial institutions around the world, which could …
Android adware ‘infects millions’ of phones and tablets
Android users are being warned that several popular apps that were on the official Google Play store appear to have contained hidden code that …
Malicious code on ID Parts website, credit card data of 12K customers stolen
Massachusetts-based automotive parts seller ID Parts is notifying roughly 12,000 individuals that malicious code was inserted into the functions that process customer payment information …
Today’s computers face more attacks than ever
Nestled into a storefront at the top of San Francisco’s tree-lined Valencia Street is one of the city’s top defenses in the war against …
Modern security tactics fail to protect against malware, study finds
No matter if you work for a government contractor or a top legal firm, there’s a good chance your company’s computers are infected with …
Recent Comments