Post Tagged with: "APT"

Verizon: Internet of Things Hacks Pose Little Risk – For Now

April 15, 2015 14:391 comment
Verizon said that threats from Internet of Things technologies were more theory than practice in 2014, but that 2015 could see IoT devices play a role in breaches.

In-brief: Verizon said in its latest Data Breach Investigations Report that threats from Internet of Things technologies were more theory than practice in 2014, but that 2015 could see IoT devices play a role in breaches. Like this:Like Loading…

Read more ›

With Executive Order, Cyber Criminals Join Terrorists, Traffickers on Sanctions List

April 1, 2015 11:320 comments
President Barack Obama signed an Executive Order on Wednesday that put cyber crimes on par with others that can result in sanctions against malicious actors and those who support them.

In-brief: An Executive Order signed by President Obama on Wednesday will clear the way for cyber criminals to face the same sanctions as terrorist groups, illegal arms dealers and drug traffickers. One expert called the Order “momentous.”  Like this:Like Loading…

Read more ›

Petulant Penguin Attacks Use Antarctica As Base

09:100 comments
The firm Crowdstrike joined other security companies in warning about sophisticated attacks that use compromised computers at research bases on Antartica to launch targeted attacks. They dubbed the campaign "Petulant Penguin."

In-brief: A new sophisticated cyber crime campaign dubbed “Petulant Penguin” by one research firm appears to use compromised computers at Antarctic research bases to launch targeted attacks on government agencies in the U.S. and Europe.  Like this:Like Loading…

Read more ›

Supply Chain Hackers Use Short List of Techniques | Trend Micro

March 31, 2015 11:161 comment
Trend Micro describes some of the most common supply chain attack techniques in a blog post.

In-brief: Trend Micro notes that supply chain attacks are on the rise, with attackers relying on a short list of techniques including compromises of source code, firmware and so-called “watering hole” attacks. Like this:Like Loading…

Read more ›

Is Google’s Rowhammer the Future of IoT Attacks?

March 30, 2015 14:410 comments
Is Google’s Rowhammer the Future of IoT Attacks?

In-brief: Infoworld’s Roger Grimes makes the case that Google’s recent Rowhammer exploit may be a sign of things to come as attackers look for common platforms to attack the Internet of Things.  Like this:Like Loading…

Read more ›
%d bloggers like this: