Search Results for "DDoS"

The Unbalanced Negative Externalities of Cybersecurity

In-Brief: Software and the critical systems it powers are now central to our modern lives. But that very software is under growing threat and require new approaches to address those threats, says Symantec CTO Amit Mital. Successes in the arena of public health may be a guide.

Third World Problem: Bot Herders Target Home Routers In Developing Nations

In-brief: A new global botnet is built on lightly secured home broadband routers in developing nations, according to a report from the firm Incapsula. 

IBM: Dyre Banking Malware Behind Sophisticated Crime Spree

In-brief: IBM researchers say they have seen a spike in malicious activity linked to the Dyre family of malware. Sophisticated attacks on business banking accounts have led to the theft of millions of dollars, IBM says. 

Petulant Penguin Attacks Use Antarctica As Base

In-brief: A new sophisticated cyber crime campaign dubbed “Petulant Penguin” by one research firm appears to use compromised computers at Antarctic research bases to launch targeted attacks on government agencies in the U.S. and Europe. 

Threats in 2014: Bears and Pandas and Malware – Oh My!

  In-brief: a report from the firm CrowdStrike finds sophisticated nation-backed hacking groups were very active in 2014, with attacks on governments, pro-democracy advocates as well as banks and retailers.