Last week, the FBI warned U.S. industries of a new highly skilled group of hackers that was targeting companies and government agencies in a long-running cyberespionage campaign. Novetta says that's the same group of hackers, the Axiom group.
Another day, another Chinese hacking group gets publicly shamed. This time it is group dubbed Axiom, identified by a coalition of international cybersecurity firms. The group has hit a lot of computers around the world, targeting pretty much all kinds of victims such as government and law enforcement agencies, human rights and environmental groups, software companies, and more, according to the researchers.
Read moreThe security firm of the USA has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government.
Russian cyber espionage efforts have long been considered unrivaled in skill and scope, but the difficulty of identifying attacks and tracing them to an identifiable source has prevented cyber security investigators from pinning any activity directly on a single Russian entity. But evidence of a wide-ranging cyber espionage campaign is mounting. Earlier a group of Russian hackers with suspected government backing had used a previously unknown backdoor.
Read moreThe National Institute of Standards and Technology is warning users of a newly discovered Zero-Day flaw in the Samsung Find My Mobile service, which fails to validate the sender of a lock-code data received over a network.
The Find My Mobile feature implemented by Samsung in their devices is a mobile web-service that provides samsung users a bunch of features to locate their lost device, to play an alert on a remote device and to lock remotely the mobile phone so that no one else can get the access to the lost device. The flaw allows an attacker to remotely lock or unlock the device and even make the device rings too.
Read moreMost computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.
Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.
Read moreIt's as if a robber were to break into a bank today and stay there until Christmas before someone noticed. That's how long hackers had access to JPMorgan Chase's computer system.
If two months seems like an eternity for cyberthieves to wander through the computers of the country's largest bank, consider that hackers have had free rein for even longer at several major retailers this past year. Hackers resided on the computers of Neiman Marcus for five months, Home Depot for five months, arts and crafts store Michaels for eight months and Goodwill, the thrift store, for a year and a half.
Read moreIf you’ve got an email in your inbox from the World Health Organization offering “information and prevention” tips about Ebola, don’t click on its attachment – you’re likely to end up with a nasty digital infection.
Cybercriminals are using the current Ebola outbreak as a topical hook for spam emails that can install malware giving them remote access to computers, including logging key presses, capturing video from webcams and stealing passwords. Online Security firm Trustwave’s SpiderLabs team of ethical hackers published details of the scam, noting that emails pretend to be from the World Health Organization.
Read moreA company that develops cyber security and information security products and services to defend organizations against cyber attacks and to protect critical assets has published a new report and introduced a list of countries most under threat from cyber attack.
APTs are complex attacks by hackers for which complicated techniques are used to sneak into a network and carry out prolonged information gathering attacks. They are often carried out by state-backed players or sophisticated criminals and have an element of human control, in contrast with some cyberattacks solely carried out by an automated piece of code.
Read moreThe retailer and the fast-food chain are the latest businesses to report that hackers accessed payment-card data by breaching their systems. Kmart and Dairy Queen customers should check their credit- and debit-card statements for shady activity.
That's because the retailer and the fast-food chain have become the latest businesses to reveal that their payment systems were hacked. The breach has been plugged and the malware removed, James said. Dairy Queen similarly said there was no indication that any other personal information was affected and that the security hole had been addressed.
Read moreA cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks.
The campaign, dubbed “Sandworm” is believed to have been running since 2009, and used a wide-reaching zero-day exploit uncovered by the researchers that affects nearly every version of the Windows operating system released since Windows Vista. The attackers also targeted attendees of this year’s GlobSec conference, a high-level national security gathering that attracts foreign ministers and other top leaders.
Read moreDropbox is at the centre of a leak scandal, following the releasing of 400 usernames and passwords by an anonymous user on Pastebin. The hacker claims the initial dump is just a portion of the 6,937,081 Dropbox accounts he claims to have compromised.
He then requested Bitcoins in payment before he would allow access to more accounts. Dropbox said the service had not been hacked and these passwords were expired. At the time of writing, when entering the leaked usernames and passwords into Dropbox, the service prompts the user to reset your password by sending an email to the registered address.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland