The Latest in IT Security

1

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they use has never been more pointless, a study commissioned by Arbor Networks has revealed.

Read more ...

1

Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries. The targets are all suspected customers of a counter anti-virus platform and crypter service – two cybercriminal tools used for testing and clouding of malware samples to prevent security software solutions from recognising them as malicious.

Read more ...

1

Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in targeted attacks, such as BlackEnergy or Operation Ghoul, aimed at the industrial sector, but also in more common cyberthreats that do not target specific victims.

Read more ...

1

Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to get to know our malware intelligence crew. Without further ado, we present our first victim, researcher, and blogger Pieter Arntz.

Read more ...

Categories

MONDAY, JUNE 26, 2017

Featured

Archives

Latest Comments

Social Networks