Stuxnet – the famous worm widely credited with crippling the Iranian nuclear weapons programme for several years – also infected the internal network of a Russian nuclear plant.
Browsing: Malware and Vulnerabilities
This discussion will highlight the importance of establishing organizational identity which is a key component for shared local, regional, national and international situational awareness.
7th November 2013: ASG Software Solutions (ASG), a recognized innovator in enterprise IT software solutions, and New Net Technologies (NNT) have announced a collaboration to manage IT security threats through ASG’s Enterprise Automation Management System (EAMS).
Microsoft has issued a new security advisory, with a temporary Fix it, giving details on a zero-day exploit against older versions of Windows
Recently security expert Dragos Ruiu unveiled his research on a new strain of malware called badBIOS. Theoretically, the malware can contaminate everything from Windows to OS X machines
While Facebook and Microsoft already run security bug bounty programs of their own, the two companies are now working together to reward researchers
The US Federal Bureau of Investigation has added five new names to its “Cyber’s Most Wanted” list, bringing the total number of fugitives urgently wanted in
ColdFusion induced breaches are definitely on the rise, which teaches us that hackers and security researchers are looking into this platform more and more as a green field for hacking endeavours.
It’s been long known that cyber-criminals utilize advanced information-stealing malware and Trojans to gain access to corporate endpoints and networks, disrupt operations and steal sensitive business data, intellectual property and financial information.
Social and political commentators have written volumes on the impact of globalisation on national economies and the way societies conduct business.