Tag: malware

Is the data privacy movement waiting for its Cuyahoga River fire or Love Canal? The muted response to the most recent data dumps say "yes." (Image courtesy of Library of Congress.)

Amid More Dumping, Data Privacy Movement Awaits a Spark | Digital Guardian

In-brief: Like Love Canal or the ‘flaming river’ in Cleveland that eventually prompted anti-pollution laws, the casual leak of data on 33 million U.S. professionals is a sign that our online environment is badly compromised. But can we fix it? (Editor’s note: this blog post originally appeared on Digital Guardian’s blog.)

The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored "advanced persistent threat" groups, the firm FireEye said in its most recent M-Trends report.

Report: Hacking Crews are all APT now

  In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.

The Necurs botnet has been updated to support denial of service attacks, Anubis Networks reports,

Locked and Loaded: Huge Botnet Updated for DDoS

In-brief: Researchers at Anubis Networks claim that Necurs, one of the world’s largest botnets, has added a feature for launching denial of service attacks. 

How Machine Learning Supplements Security Workforce | Cylance Blog

How Machine Learning Supplements Security Workforce | Cylance Blog

In-brief: Filmed at The RSA Security Conference in San Francisco, Security Ledger Editor in Chief Paul Roberts talks about the growing interest in machine learning technology in the information security field and how it is being applied.

Kaspersky said it spotted infections affecting 140 organizations globally. (Image courtesy of Kaspersky Lab.)

File-less Malware Attacks Target Bank, Business Networks

In-brief: Security experts are warning that so-called “file-less” attacks on commercial networks operated by banks and other firms are spreading and harvesting sensitive information, like administrator user names and passwords.