The Latest in IT Security

1

Attackers prefer to reuse code and tools for as long as they keep working. In that tradition, researchers have found evidence suggesting a cyberespionage group is still successfully using tools and infrastructure that was first deployed in attacks 20 years ago. The Moonlight Maze refers to the wave of attacks that targeted U.S. military and government networks.

Read more ...

1

The latest political upheaval to hit the U.S. is very relevant to anyone involved in tech: Congress has voted to overturn recent FCC rulings that would have forced ISPs to get your permission to collect and sell data on your various online habits. You know all that targeted advertising that makes you crazy (and provides a nice income for broadband providers)?

Read more ...

1

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks. On Friday, the site dumped the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year. The files do appear to show “obfuscation techniques”.

Read more ...

1

The Russian government used “thousands” of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, according to one lawmaker. Disinformation spread on social media was designed to raise doubts about the U.S. election and the campaign of Democratic presidential candidate Hillary Clinton, said Senator Mark Warner, a Virginia Democrat.

Read more ...

Categories

SUNDAY, APRIL 30, 2017

Featured

Archives

Latest Comments

Social Networks