Once again, the UK’s most promising amateur cyber defenders competed to defend the City of London from a simulated cyber-attack, as part of the Cyber Security Challenge Masterclass. A 19-year-old student was crowned the UK Cyber Security Champion after…
Edward Snowden: The Internet Is Not Our Enemy, and Encryption Can Protect It
Edward Snowden was a surprise speaker at TED2014 in Vancouver. Beamed in via a telepresence robot from his exile in Russia, he spoke to TED presenter Chris Anderson, and was joined by ‘father of the web’ Sir Tim Berners-Lee. Snowden said there is more …
Undetected for Years, Operation Windigo Affects Millions of Servers
A vast spam and malware campaign has been uncovered that has seized control of more than 25,000 UNIX servers worldwide, daily affecting half a million computers. The backdoor trojan is responsible for sending more than 35 million spam emails every day.
Trustwave Acquires Cenzic to Add Dynamic Testing
Trustwave announced Tuesday that it has acquired Cenzic for an undisclosed sum, thus combining Trustwave’s static application security testing capabilities and Cenzic’s dynamic application security testing into a single platform.
Trustwave Acquires Cenzic to Add Dynamic Testing
Trustwave announced Tuesday that it has acquired Cenzic for an undisclosed sum, thus combining Trustwave’s static application security testing capabilities and Cenzic’s dynamic application security testing into a single platform.
Commercial RAT Used by Malicious Hackers
Win-Spy is a commercial off-the-shelf (COTS) stealth monitoring tool. “Start Spying on any PC or Phone within the Next 5 minutes,” says its website. With such products generally available, why should hackers go to the trouble of developing their own RA…
Join the Grand Theft Auto 5 PC Beta Program Scam
Everybody likes to be first. Publications like to be the first to publish news, politicians like to be the first with good news, and gamers like to be the first to experience a new game. That’s what makes gamers such obvious targets for scams, spam and…
Hollywood Likely to be Targeted by Chinese Hackers
Hollywood appears to be emerging as a prime target not just for video pirates, but for Chinese hackers. This is the conclusion of security researchers who have examined the probable attitude of China toward the cultural impact of Hollywood.
Security in Apple’s iOS 7 Weaker, Not Stronger, than iOS 6
Aware of weaknesses in the early_random() pseudo random number generator used in iOS 6, Apple switched to an entirely new generator in iOS 7. In doing so, however, it weakened rather than strengthened the random number generation that lies at the heart…
LightOut is Latest Cyber Threat to Target Energy Sector
What happens when the energy grid goes down? Well the lights, of course, go out. A fresh advanced persistent threat (APT) targeting the energy sector is thus aptly named LightsOut, and like previous attacks, it used a watering hole method to start its …