A US government decision to stop using security software from Kaspersky Lab is "regrettable" said the Kremlin. The Russian statement came in response to the 90-day deadline given to US federal agencies to remove the software. The US Department of Homeland Security said it was concerned about ties between company officials and the Russian intelligence Read More
Topic: Network Security
FBI Arrests Another Hacker Who Visited United States to Attend a Conference
The FBI has arrested a Chinese citizen for allegedly distributing malware used in the 2015 massive OPM breach that resulted in the theft of personal details of more than 25 Million U.S. federal employees, including 5.6 Million federal officials' fingerprints. Yu Pingan, identified by the agency as the pseudonym "GoldSun," was arrested at Los Angeles Read More
8 More Chrome Extensions Hijacked to Target 4.8 Million Users
Almost two weeks ago, we reported how unknown attackers managed to compromise the Chrome Web Store account of a developer team and hijacked Copyfish extension, and then modified it to distribute spam correspondence to users. Read More
Defending Against Cyberwar: How the Cybersecurity Elite Are Working to Prevent a Digital Apocalypse
Locked Shields is run by NATO's Cooperative Cyber Defence Centre of Excellence (CCD COE) and bills itself as the largest and most complex international technical network defence exercise and involves 900 participants from 25 nations. This year there were 18 national teams, plus one team from NATO itself playing the game. Read More
Teams Defend Against Simulated Attacks in Cyber Guard Exercise
The sixth annual Cyber Guard exercise, co-led by Cybercom, the Department of Homeland Security and the FBI, wrapped up with the tone set by the Cybercom commander in his June 12 opening remarks. "I will accept failure in a training environment if it generates knowledge and insight that makes us better," said Navy Adm. Michael S. Rogers, who also serves as Read More
Blockchain: Overhyped Buzzword or Real-deal Enterprise Solution?
While blockchain is among the hottest technologies in the enterprise security, data storage and file-sharing arenas, many experts question its use or even whether it's really as secure as billed. Read More
Watch Hackers Take Over the Mouse of a Power-Grid Computer
The best work of hackers tends to remain invisible. But when sophisticated intruders broke into the computer networks of regional energy firms in Ukraine in 2015 and cut power to roughly a quarter million people, their tampering didn't go unnoticed. In this rare instance, the staff of one of those electric utilities managed to capture the hackers' handiwork Read More
How Game Theory and Nash Equilibrium Can Help Decide Cybersecurity Responses
Watching the movie A Beautiful Mind, where Russell Crowe played John Nash, a professor of mathematics who won the Nobel Prize for his contributions to a complex concept called game theory, one would never guess that a hypothesis of his Nash equilibrium would someday help improve cybersecurity strategy. Read More
Intel Patches Nine-Year-Old Critical CPU Vulnerability
Intel patched a critical vulnerability that dates back nine years and impacts business desktop PCs that utilize the company's Active Management Technology. According to an Intel security bulletin, the flaw could allow an adversary to elevate privileges on a vulnerable system. Read More
Windows Bug Used to Spread Stuxnet Remains World’s Most Exploited
The Windows vulnerability was first publicly disclosed in July 2010, a few days before security reporter Brian Krebs was the first to report on the Stuxnet outbreak. Read More