Skip the navigation

More Cyberwarfare News

IBM buys access control and identity management firm CrossIdeas

IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.

Thousands of sites compromised by WordPress plug-in flaw

A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.

Zero-day flaws in Tails aren't for sale, broker says

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.

Black Hat presentation on TOR suddenly cancelled

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.

AirMagnet Wi-Fi security tool takes aim at drones

In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.

EFF releases Chrome, Firefox plugin to block third-party tracking

The Electronic Frontier Foundation, a digital privacy rights group, has released a downloadable plugin for Chrome and Firefox designed to stop third parties from tracking people's Web browsing.

Google sets up a cybercrime-busting task force -- Project Zero

Google has set up an internal task force that will work to expose the activities and techniques of malicious Internet wrongdoers, aiming to cut down on the number of targeted cyberattacks.

New banking malware 'Kronos' advertised on underground forums

A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.

The Gameover Trojan program is back

Cybercriminals are trying to create a new botnet based on what is likely a modification of Gameover Zeus, a sophisticated Trojan program whose command-and-control infrastructure was taken over by law enforcement agencies at the beginning of June.

China calls the iPhone and iOS 7 threats to national security

China's state-run TV is telling iPhone owners that the device is a threat to national security because it tracks their movements.

New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on

The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.

Senate Intelligence Committee okays cybersecurity bill

The U.S. Senate Intelligence Committee approved Tuesday a cybersecurity bill that would pave the way for sharing of information between government and the private sector on security threats.

Spamhaus pushes for arrests of alleged DDoS participants

An antispam organization is pushing for quick law enforcement action against five people it alleges took part in one of the largest cyberattacks on record that caused Internet outages throughout Europe early last year.

Chinese hackers switched targets to U.S. experts on Iraq

A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.

NSA defends collecting data from U.S. residents not suspected of terrorist activities

The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.

Mobile phones, other devices under higher scrutiny at airports

The U.S. Transportation Security Administration has said it may ask air travelers headed to the U.S. on direct flights to power up some electronic devices, including cell phones, as part of enhanced security measures at certain airports abroad.

Attack on Dailymotion redirected visitors to exploits

Attackers injected malicious code into Dailymotion.com, a popular video sharing website, and redirected visitors to Web-based exploits that installed malware.

Ruby on Rails patches tackle SQL injection vulnerabilities

Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites.

Secret code indicates NSA tracks privacy tool users

A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source.