Blog Posts Tagged with "Targeted Attacks"

03b2ceb73723f8b53cd533e4fba898ee

Expect New Wave of Cyber Attacks Against Banking

September 26, 2012 Added by:Pierluigi Paganini

A possible Iranian cyber offensive against US banks has been discussed recently, and immediately denied by government of Teheran. Financial institutions are targets for a cyber attacks, as the banking system is a critical asset for a nation and its paralysis could damage economic activities...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

State Sponsored Malware Takes Over Mars Rover

August 10, 2012 Added by:J. Oquendo

Many companies will omit many details and shift-slash-skew agendas to meet their concerns. Those concerns will ALWAYS be financial ones. At this point it is obvious that they and only they are capable of detecting the unseen, unheard of, undetectable, uberfilthware capable of infecting curiousity on Mars...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Mahdi Trojan Employed in Middle Eastern Cyber Espionage

July 18, 2012 Added by:Headlines

"It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet was Only the Beginning of US Cyberwar Against Iran

July 16, 2012 Added by:Headlines

"Almost all cyberattacks are 'to whom it may concern' but Stuxnet was a bullet with someone's name on it. Repeating something like Stuxnet or (computer virus) Flame will be much more difficult... But the defender needs to plug all holes, while the attacker need only find one..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Advanced Persistent Threats: Separating the Unicorns from Reality

July 14, 2012 Added by:Rafal Los

APT - Advanced Persistent Threat has been the nervous topic for a long time now in Information Security. While there is a metric ton of misinformation and confusion about what constitutes an Advanced Persistent Threat, the thrust seems to be that once you're a target, you're a victim...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

LinkedIn Breach Part II: What You Need to Prepare for Next

June 09, 2012 Added by:Jason Clark

The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...

Comments  (4)

4ff49873e3fed9a24adf0d37ae00b780

Is this the Official Beginning of a Cyberwar on the Internet?

June 06, 2012 Added by:Lee Munson

Even though we came close to a confirmation with the Stuxnet attack, can you really say that it is the beginning of a cyber war? All we can really say now is that it is the escalation of one that has already been ongoing. It is assumed that we are in the middle of a cyber war already...

Comments  (0)

296634767383f056e82787fcb3b94864

Google's Worst Security Idea Ever

June 06, 2012 Added by:Jeffrey Carr

Google announced that it will notify a subset of its Gmail customers if they're the victim of a State-sponsored attack. Google's advice is FUD-inducing for people who aren't targets and insufficient for those who are. I have to wonder what Google was thinking when it created this awful program...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Dangers of Chasing the Next Flame [Malware]

June 05, 2012 Added by:Rafal Los

Are we under cyber attack? Yes - but we have been aware of this for quite some time. Is there an escalation in the ferocity with which complex organizations are being attacked by unknown parties? Absolutely. But if you don't have your enterprise resiliency fundamentals in order, who really cares...

Comments  (0)

2dc39ef06d1ad53bea80d28b84f3aa7e

Companies Hit in Targeted Attacks

May 18, 2012 Added by:Gregory Hale

If an attacker wants to target a system, they will get in no matter what, what kind of damage occurs depends on how many layers of security buttress the system. Companies in specific industries could band together and share information on attacks that target their industries...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Strategic Web Compromises and Cyber Espionage Operations

May 15, 2012 Added by:Headlines

"Cyber Espionage attacks are not a fabricated issue and are not going away any time soon... They are aiming to expand their access and steal data. Communications (primarily e-mail), research and development (R&D), intellectual property (IP), and business intelligence..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Internet Security Threat Report Summary

May 01, 2012 Added by:Headlines

"In addition to the 81% surge in attacks, the number of unique malware variants also increased by 41% and the number of Web attacks blocked per day also increased dramatically, by 36%. Greater numbers of more widespread attacks employed advanced techniques..."

Comments  (2)

37d5f81e2277051bc17116221040d51c

Why Taunting Computer Hackers Isn’t a Good Idea

April 25, 2012 Added by:Robert Siciliano

UFC President issued the challenge to hackers because he supports SOPA and PIPA, and UFC.com was hacked. Kicking a hornets’ nest isn’t advisable, and neither is taunting criminal hacktivists who have lots of time and resources to make your business network a target...

Comments  (1)

E973b16363b3de77b360563237df7e32

Observations on Lack of Research in Social Engineering

April 19, 2012 Added by:Bozidar Spirovski

The attack was performed by multiple phone calls which created contact with multiple targets. Each call was a probing attempt to collect as much information possible. The first and second stage of the attack was aimed at the same targets but with several days delay between stages...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SabPub - The Latest Mac OS X Backdoor Java Exploit

April 16, 2012 Added by:Headlines

"This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks... The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hackers Target Social Media for Social Engineering Attacks

March 22, 2012 Added by:Dan Dieterle

Hackers are getting much better at their craft, and people are making it very easy for them. A Social Engineer will use information gathered about a person, place or business in specially crafted attacks that play on people’s thoughts, beliefs or emotions...

Comments  (0)

Page « < 1 - 2 - 3 > »
Most Liked