“How to protect from a Stuxnet attack? Simple.” Eugene Kaspersky speaks at...
Eugene Kaspersky gave an excitable talk to a packed hall of mostly stone-faced delegates at CeBIT 2014 today. Despite playing to a tough crowd, he ploughed through and offered a vision of a world where...
View ArticleDragonfly malware proving a pest for thousands of energy companies
Security firm Symantec has discovered a malware attack that has compromised over 1,000 European and North American energy companies. The hackers are thought to be part of a group known as ‘Dragonfly’,...
View ArticleDragonfly is the latest advance in weaponised malware
The discovery of the Dragonfly attack pulls back the veil ever so slightly on some of the tradecraft used in modern espionage. If the researchers’ conclusions prove even only partially correct, it...
View ArticleKaspersky Lab: 19 million Windows systems encounter Stuxnet in just 8 months
Over 19 million Microsoft Windows systems across the world continue to encounter the notorious Stuxnet malware due to the reluctance by users in emerging countries to upgrade from Windows XP to a new...
View ArticleCyber attacks on critical infrastructure: Too much to C.H.E.W?
From a cyber attack perspective, 2014 has been a watershed year for the critical infrastructure industry. After generally resisting the notion of vulnerabilities because of the stated traditional...
View ArticleRegin espionage malware threatens nations and corporations
There’s a new piece of dangerous espionage malware threatening the security of nations around the world, along the lines of Stuxnet. It’s called Regin, and security firm Symantec says it displays a...
View Article‘Iran is the new China’ declared as Iranian hackers threaten ‘world’s...
Iranian hackers have been running amok and breaching a shed-load of leading corporations across the globe, according to an American security company. Cylance reckons that over the past couple of years,...
View ArticleMicrosoft patches FREAK vulnerability
Microsoft has patched FREAK, a decade old security flaw which allowed man-in-the-middle (MiTM) attacks on its OS Windows. With FREAK, attackers could intercept secured network communications....
View ArticleEducating the weakest link: Five security tips for your workforce
In the past few years, we have witnessed some of the largest, most costly cyber-attacks on businesses to date. Back in 2013, a man posing as a BT engineer entered a London branch of the Santander bank...
View ArticleCyber War and the deficiences of cyber weapons
Cyber war is often in the headlines. The hype centered on state sponsored malware means that the lines defining fact and fiction often become blurred leading to increasing fear bordering on hysteria....
View Article
More Pages to Explore .....