Blog Posts Tagged with "Targeted Attacks"


Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)


Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Plagiarist Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)


Yet Another Chinese-Based Targeted Malware Attack

March 14, 2012 Added by:Headlines

"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."

Comments  (0)


A Stuxnet Drinking Game

March 12, 2012 Added by:Joel Harding

If one deconstructs Stuxnet down to its basic functions, nothing is new - but in its execution, success and the huge publicity of its discovery, Stuxnet is a finely manufactured weapon which I expect will be duplicated in its functionality many, many times...

Comments  (0)


The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)


The Changing World of Information Security Compromises

March 08, 2012 Added by:Brent Huston

Hacktivism is an extended threat for infosec. You can be targeted for your partnerships, role in a supply chain, to steal CPU cycles/storage from your systems, or because you have a common vulnerability. There are a myriad of reasons from the criminal to the abstract...

Comments  (0)


McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)


Iran Successfully Eradicates Stuxnet Virus Infestation

February 15, 2012 Added by:Headlines

"I would assume that once Iran learned of Stuxnet, then intelligence agencies looked at this method of cyber attack as compromised regardless of how long it has taken Iran to neutralize it. It is a cat and mouse game..."

Comments  (0)


What's More Important - Vulnerabilities or Actual Incidents?

February 13, 2012 Added by:Joe Weiss

To at least some of us in the control systems community these vulnerabilities are not unexpected. The fact that many of these systems are also connected to the Internet as Eireann Leverett demonstrated is also not new, even though the numbers of control system connected to the Internet are striking.

Comments  (0)


Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Plagiarist Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)


MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)


US-CERT Warns of Denial-of-Service Malware Campaign

January 26, 2012 Added by:Headlines

US-CERT has received reports of attacks using malware-laden email attachments. The advisory comes one week after multiple DDoS attacks were launched against entertainment industry and US government websites by Anonymous supporters in an operation dubbed OpMegaupload...

Comments  (0)


Cyber Defense: Welcome to 2012 and Interesting Times

January 05, 2012 Added by:Cyber Defense Weekly

2011 was the year that state sponsored hacking finally came to national attention with hundreds of articles exposing the continued industrial and military cyber espionage credited to the likes of China and Russia. We can be sure that 2012 will bring more of the same...

Comments  (0)


Security: Three Tips When Speaking to the Board of Directors

December 16, 2011 Added by:Jason Clark

Many CISOs are getting questions specifically about whether they are protected from targeted attacks, malware, and data breaches. And many of these questions are coming from people who don’t really know what terms like “targeted attack” or “malware” actually mean - the Board of Directors...

Comments  (4)


Duqu Analysis Shows ICS-SCADA Networks Vulnerable

December 15, 2011 Added by:Headlines

"Critical infrastructures are still not sufficiently prepared for attacks like DuQu... There are no commonly adopted ICS security standards, guidelines or regulations, corporate management is not sufficiently involved, and there are numerous technical vulnerabilities..."

Comments  (0)


Symantec: Critical Infrastructure Protection Declines

November 01, 2011 Added by:Headlines

“The findings of this survey are somewhat alarming, given recent attacks like Nitro and Duqu that have targeted critical infrastructure providers,” said Dean Turner, director, Global Intelligence Network for Symantec...

Comments  (0)

Page « < 1 - 2 - 3 > »