Radio Tactics has signed a partnership agreement with Wynyard Group, a New Zealand based provider of critical threat assessment and advanced crime analytics software.
What happens when the energy grid goes down? Well the lights, of course, go out. A fresh advanced persistent threat (APT) targeting the energy sector is thus aptly named LightsOut, and like previous attacks, it used a watering hole method to start its system compromise.
Russian state and media websites have been hit by a wave of denial-of-service attacks. The attacks followed the blockage of several major Russian media outlets at the order of the Kremlin.
Hackers brought down several public NATO websites, the alliance said on Sunday, in what appeared to be the latest escalation in cyberspace over growing tensions over Crimea.
There are so many applications and so much data on mobile devices that trying to ask the right question can sometimes be tricky.
AccessData has announced the first recipients of the AccessData Forensic Endowment Program (ADFEP) honoring the Mississippi Gulf Coast Cyber Crimes Task Force and the City of Glendale, Arizona Police Department.
As organizations brace themselves for another year of heightened cybersecurity threats, a risk much closer to home may pose a greater challenge.
Cybersecurity is emerging as one of the biggest threats for exchange operators as hackers become more sophisticated in their efforts to disrupt the global financial system, a group of exchange leaders told an industry conference.
The National Security Agency (NSA) has shot down as "inaccurate" a new press report that the agency has potentially planted malware on potentially millions of computers worldwide and even impersonated Facebook and other websites to lure potential targets.
Since November 2013, researchers at Stanford University have been asking: What’s in your metadata?
A new Whatsapp flaw that allows any other applications on your Android device to exfiltrate and decrypt past Whatsapp conversations has been discovered and revealed by security consultant Bas Bosschert.
The massive data breach at Target, along with a wave of other attacks on retailers that has come to light in the past few months, has turned up the heat on the retail sector to formalize intelligence sharing on threats and attacks on the industry.
More than a year ago, Kaspersky Labs analyzed dozens of modules used by Red October, an extremely sophisticated cyber-espionage operation that has been at work in dozens of high-profile targets. New analysis shows that one of its genetic progenitors is likely Agent.btz, a long-running, data-collecting worm believed to have been developed by Russian special services.
A United Nations photograph showing a sea of hungry Palestinians awaiting emergency food amid the detritus of their bomb-ravaged neighborhood near Damascus has been retweeted more than eight million times in the past few weeks, becoming such an arresting image of the Syrian civil war that some blogosphere skeptics have suggested that it was digitally faked.
As part of an agreement to share data with the staff of the Senate Select Committee on Intelligence on its controversial detention and interrogation program, the CIA leased a space and hired contractors to run a top-secret network, which it filled with millions of pages of documents dumped from the agency’s internal network.