Researchers have analyzed 11 apparently distinct APT campaigns, and have come to the conclusion that they are not as distinct as previously thought – in short, there’s a malware quartermaster, a Moriarty of cybercrime, serving multiple threat actors.
PCI DSS Version 3.0 Goes Beyond Compliance
The PCI Security Standards Council (PCI SSC) has published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) for debit and credit card security, geared to move organizations from mere compli…
How GCHQ hacked Belgacom
In September Der Spiegel published details from Snowden leaks indicating that GCHQ had been behind the hacking of Belgian telcommunications company Belgacom, in an operation codenamed Op Socialist. On Friday it published further details indicating how …
Stuxnet Also Infected Russian Nuclear Facility
Stuxnet is widely taken to be the harbinger of modern cyberwarfare. It was developed by the US and Israel to target the Iranian nuclear program – but now it appears that it also infected a Russian plant.
British Spy Agencies, Al Gore and Berners-Lee all Talking About Snowden
In an unprecedented move, the reclusive heads of Britain’s MI5, MI6 and GCHQ spy agencies appear in public before a parliamentary committee, while Al Gore gives a speech in Montreal and Sir Tim Berners-Lee is interviewed by the Guardian – and all are t…
Adobe Breach is Far, Far Worse than Originally Thought
After Brian Krebs gave Adobe a strong hint that it had been breached, the company announced that just short of three million accounts may have been compromised. It later upped this to 38 million – but it now appears that the true figure is around 150 m…
Lack of IT Automation Drives Frequent Firewall Outages
For UK and US businesses, increased complexity stemming from trends like cloud computing and virtualization is driving a need for more automation within the IT network; but reality is lagging the requirement.
Automatic IFS Encryption for IBM i with New Release from Linoma Software
Linoma Software’s Crypto Complete data encryption solution is breaking ground on IBM i by providing automatic encryption of files stored on the operating system’s integrated file system (IFS).
Computer Animation Snares 1000 Sex Predators
Terre des Hommes is a network of ten international organizations that work for the rights of children. TDH Netherlands, Monday, published a dossier on, and a call to action to stop, the web cam sexual exploitation of children.
CryptoLocker Most Current Prolific Malware
CryptoLocker is a new breed of ransomware that encrypts victims’ data with public key encryption, and demands payment for the decryption key – the only way that infected victims can regain access to their data.