Internet of Things


492 articles

Malware

Do I need to worry about state-sponsored threats like Regin?

Do I need to worry about state-sponsored threats like Regin?

Malware

Do I need to worry about state-sponsored threats like Regin?

Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?

Lysa Myers26 Nov 2014


Malware

'Citadel' trojan attacking password managers

'Citadel' trojan attacking password managers

Malware

'Citadel' trojan attacking password managers

Using password managers is often recommended as good practice in order to prevent overusing the same logins, but a new malware has been uncovered that specifically targets the password managers that hold all the variants.

Alan Martin24 Nov 2014


Malware, Scams, Cybercrime

Week in Security: Grief for gamers, Unicorn spotted - and America wakes up

Week in Security: Grief for gamers, Unicorn spotted - and America wakes up

Malware, Scams, Cybercrime

Week in Security: Grief for gamers, Unicorn spotted - and America wakes up

Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam - but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

Rob Waugh21 Nov 2014


Malware

Wireless attacks against 'air gapped' targets are possible, Israeli team claims

Wireless attacks against 'air gapped' targets are possible, Israeli team claims

Malware

Wireless attacks against 'air gapped' targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information - without using hardware such as USB keys.

Rob Waugh20 Nov 2014


Malware

BadUSB potential not as widespread as originally thought, but remains difficult to avoid

BadUSB potential not as widespread as originally thought, but remains difficult to avoid

Malware

BadUSB potential not as widespread as originally thought, but remains difficult to avoid

The BadUSB malware which potentially turns any USB stick into a 'unpatchable' malware carrier doesn't quite have the potential for mayhem it was originally feared, according to the researcher who uncovered the exploit.

Alan Martin13 Nov 2014


Malware

Sednit Espionage Group Attacking Air-Gapped Networks

Sednit Espionage Group Attacking Air-Gapped Networks

Malware

Sednit Espionage Group Attacking Air-Gapped Networks

The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.

Joan Calvet11 Nov 2014


Malware

Hacking planes - researchers developing system to stop in-flight malware

Hacking planes - researchers developing system to stop in-flight malware

Malware

Hacking planes - researchers developing system to stop in-flight malware

City University professor Dr David Stupples and a team of researchers are looking into ways of minimizing the risk of hacking planes in the future.

Alan Martin04 Nov 2014


Malware

"More human" carder malware emerges for sale in dark web

"More human" carder malware emerges for sale in dark web

Malware

"More human" carder malware emerges for sale in dark web

A carder like tool for cybercriminals that promises to use stolen credit card details in a more 'human way' to bypass fraud detection has been found on sale for as little as $180, according to The Register.

Alan Martin30 Oct 2014


Malware

Stealthy malware uses Gmail drafts to steal data

Stealthy malware uses Gmail drafts to steal data

Malware

Stealthy malware uses Gmail drafts to steal data

A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as "the command and control to steal data."

Alan Martin30 Oct 2014