Cylance has detailed coordinated attacks by hackers with ties to Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of critical industries, with most attacks on airlines and airports, energy, oil and gas, telecommunications companies, government agencies and universities.
Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.
On 26 and 27 November, law enforcement agencies from all over the world, in cooperation with the airline, travel and credit card industries, joined forces in a major concerted action to combat online fraud.
Sony Pictures Entertainment has hired FireEye Inc's Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio's computer network nearly a week ago, three people with knowledge of the matter said.
A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.
The University at Albany School of Business has been selected to host a research laboratory designed to improve exploration into cyber security and incident response. Computer forensic leader, The ARC Group of New York (ARC), has donated software and services valued at more than a half million dollars to support this critical endeavor.
After Symantec published its report on the Regin super-spyware, there were many questions raised. Who coded it? What can it do? And – above all – why did it take so long for security vendors to notice it?
The holiday sales season and the online crush that accompanies it might seem a natural field day for hackers looking to attack the small and midsize retailers who depend on these sales to bump them into the black. Surprisingly, it's not.
Despite the ongoing media commentary and “best practices” memos, consultant Adam Epstein of Third Creek Advisors notes that board members of small-cap companies and those considering or preparing initial public offerings are still befuddled by persistent myths on this topic.
White hat hackers have demonstrated that they could create the electronic equivalent of a skeleton key to unlock car's networks. The project's goal is more than just to plug vulnerabilities--it is to reconceive the most critical lines of computer code that control the car in a way that could make them invulnerable to some of the major known threats.
Yesterday, employees across the Sony Pictures offices were greeted with a strange picture as they tried to login to their computers. Computers at the company were completely unresponsive, showing a glowering CGI skeleton, a series of URL addresses, and a threatening message from a hacker group that identifies itself as #GOP.
A competition that challenges academic and private institutions to present solutions to fingerprint or iris spoofing is set to hold its fourth edition, with organisers saying it will play a “crucial” role in evaluating the current state of the technology.
Even though there have been at least two dozen mass breaches of government computer systems since 2013, many federal agencies continue to have a lax culture and poor security provisions to repel the growing threat from hackers and cyberattacking states such as Russia, Iran and China, internal investigative reports show.
There’s been a lot of discussion lately about the risks posed by hackers to America’s critical infrastructure systems, with terms like “cyber-Pearl Harbor” and “cyber-9/11” being bandied about by government officials and other prominent figures.
A cyber snooping operation reminiscent of the Stuxnet worm and billed as the world's most sophisticated computer malware is targeting Russian and Saudi Arabian telecoms companies. Cyber security company Symantec said the malware, called "Regin", is probably run by a western intelligence agency and in some respects is more advanced in engineering terms than Stuxnet.