Please turn on your JavaScript for this page to function normally.
Backdoor Trojan picks up commands from Evernote account

Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …

Ideas for deterring cyber espionage attacks

There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …

Massive DDoS attack targets Spamhaus

The DDoS attacks mounted against Spamhaus over a week ago have escalated in the last few days, reaching a never previously experienced level of some 300 gigabits per second at …

Researcher sets up honeypot to counterattack, identifies attackers

I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …

UK sets up cyber attack information exchange center

In an effort to help its private and public sector companies combat the cyber attacks and cyber espionage efforts directed their way, the UK government has launched a new …

Stuxnet attack was illegal under international law, experts say

The Tallinn Manual on the International Law Applicable to Cyber Warfare – the recently released tentative rulebook on what actions should and should not be considered or …

Grum botnet makes a comeback

Last year’s takedown of the Grum botnet was one the most fascinating ones so far, as it triggered a quick response from the botherders who tried to derail law …

Activists now targeted with trojanized backdoor apps

Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …

Chinese university tied to “APT1” army cyber unit

By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …

Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Five cuffed for stealing 2M euros via e-banking hacks

Five people were arrested last week when the Slovenian police conducted a series of house searches following an investigation into an gang that was emptying business bank …

Don't miss

Cybersecurity news