Cyberwarfare

Cyberwarfare news, trends, analysis and practical advice

Russian hackers use Windows zero-day to attack Ukraine, U.S. organizations

A cyberespionage group operating in Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.

cybersecurity

LulzSec leader reportedly directed cyberattacks while working for FBI

The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he worked as an FBI informant.

U.S. Navy drone

The Navy flew its new drone across the US Wednesday night

The U.S. Navy's new surveillance drone completed its first cross-country flight across the United States Wednesday night.

U.S. military didn't know of Chinese attacks against transport contractors

The U.S. Defense Department plans to tighten reporting of cyber incidents against transportation contractors after finding the military was mostly left in the dark about successful attacks from China in 2012 and 2013.

Retired US airport body scanners fail to spot guns, knives

A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.

chrome browser logo

Many Chrome browser extensions do sneaky things

An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.

Symantec folds nine Norton products into one service

Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.

Chinese man indicted over theft of Boeing C-17 secrets

A Chinese man has been indicted for allegedly directing two China-based hackers to infiltrate Boeing and other defense contractors to steal gigabytes of documents describing U.S. military aircraft.

Heartbleed software flaw exposes weaknesses in hardware design

Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.

NSA can start Judgment Day! The Skynet is falling!!

MonsterMind: Hard to terminate. Another day, another scary thing we learn about the NSA. In a recent interview, whistleblower Edward Snowden tells us to fuhgeddaboudit when the NSA gets its wires crossed. According to Snowden,...

4 Small Business Security Lessons From Real-Life Hacks

It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify.

Users told to patch critical flaw in Adobe Reader and Acrobat

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

15 new vulnerabilities reported during router hacking contest

Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.

Study finds firmware plagued by poor encryption and backdoors

The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the "Internet of Things."

IBM focuses on identity management with Lighthouse buy

IBM has purchased Lighthouse Security Group and plans to combine it with another recent acquisition to build a set of identity management software and services.

Mobile chips face lockdown to prevent hacks

Chip makers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones.

Home routers supplied by ISPs can be compromised en masse

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

Does your business need a "Data Protection Officer?"

New data-privacy regulation for the European Union expected to gain approval as early as October of this year would break new ground by requiring businesses selling goods and services to European citizens to appoint a so-called "Data...

Emerging networking tech used by Apple, Cisco frustrates firewalls

Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.

Load More