Malware

Most U.S. adults had trouble identifying key cyber security concepts including what data was secure online and the definition of a botnet.

DHS warns of BrickerBot Threat to Internet of Things

In-brief: the Department of Homeland Security is warning about destructive attacks by BrickerBot, a new piece of malicious software that attacks Linux devices and renders them useless, wiping out critical configuration information and data from the devices. 

A report from the firm FireEye warns that industrial firms still have work to do securing their environments from cyber attacks.

Seven Years After Stuxnet, Industrial Firms Still Lag on Security

In-brief: Seven years after the Stuxnet worm proved that attacks on industrial environments was possible, many industrial and manufacturing firms still lack basic elements of an effective information security strategy, a new report finds. 

A visual representation of the sites supporting "counter narratives" and other conspiracy theories online. (Image courtesy of University of Washington.)

Podcast: Facebook Makes a Stand. But can Fake News be stopped?

In-brief: Facebook on Thursday unveiled a new initiative to stamp out disinformation and ‘fake news,’ but University of Washington researcher Kate Starbird, who is studying online ‘counter narratives’ says that conspiracy theories and ‘truthers’ may be here to stay. 

The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored "advanced persistent threat" groups, the firm FireEye said in its most recent M-Trends report.

Report: Hacking Crews are all APT now

  In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.

In just the last week, remotely exploitable security holes cropped up in hundreds of models of IP enabled security cameras and recorders as well as a popular line of network attached storage (NAS) devices. The culprit? Shoddy firmware and lax oversight.

Merchants of Doh! Cameras, DVRs, NAS Fall Down on Security

In-brief: In just the last week, remotely exploitable security holes cropped up in hundreds of models of IP enabled security cameras and recorders as well as a popular line of network attached storage (NAS) devices. The culprit? Shoddy firmware and lax oversight by vendors. When will it end??