- Critical vulnerability in Git clients puts developers at risk
- Think North Korea hacked Sony? Think about this
- Researchers discover significant vulnerability that could control millions of Internet routers
- EU exploit vendors will need a ‘licence to sell’ from 31 December
- The 'grinch' isn't a Linux vulnerability, Red Hat says
spyware - News, Features, and Slideshows
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies.
A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool.
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software companies, academic institutions, pro-democracy groups and government agencies around the world.
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
A cyberespionage group operating out of Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.
- Optus Business boosts Microsoft skills with Ensyst acquisition
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Fashioning a new style of customer interaction at The PAS Group
- Infographic: Top digital trends in 2015
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer
- Forget 2015: Bing already knows which people, products and trends will win next year