Security Software Company PandaLabs has published the annual report on cyber threats proposing interesting statistics on the diffusion of malicious agent on personal computers during 2012. Malware diffusion has registered new records, the security firm detected 27 million new malicious codes, around 74,000 new samples per day, the attacks have targeted government offices and multinational […]
The week ended in the worst way for the security company Bit9 that last Friday announced that hackers had stolen digital certificates from its network and have utilized it to sign malicious code. Bit9 is a popular a company that provides software and network security services to a lot of important private firms and also to […]
Security Firm FireEye revealed to have discovered an APT campaign targeting companies in the defense and aerospace sector and that has been originated from China to steal intellectual property and industrial secrets from US companies. In this period many other attacks have been linked to China such as the cyber espionage campaign against NYT and […]
Today the principal channel for malware diffusion is considered internet, large diffusion of exploit kits and crimeware such as BlackHole, Cool Exploit and Incognito have automated the infection process over the network. Majority of attacks exploits vulnerabilities in large use applications, such as browsers, and the leak of responsive patch management expose users to serious […]
It seems that suddenly US have discovered to be victim of a serious of cyber espionage campaigns that are targeting every sector from media to military and every time seems that is a must to blame the nightmare China. A report published in 2012 by the U.S. China Economic and Security Review Commission revealed that “U.S. industry […]
Bring your own device (BYOD) is starting to take off in the workplace, as an increasing number of businesses encourage their employees to use smart phones, tablets or laptops to save costs and to allow their employees to work from any location. Unfortunately, as with all new technologies, there are also a number of risks […]
We never tire of repeating, social networks are an ideal conduit, due their large diffusion, for the spread of malware, they are used by cybercrime to realize complex fraud schema and by military to conduct offensive operations or cyber espionage campaigns. ESET Security Research has published an interesting analysis on the ‘PokerAgent’ botnet detected during 2012 […]
Rapid7 security firm has published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” in which reports the result of a research conducted in the second half of 2012 that evaluated the global exposure of UPnP-enabled network devices. Security world has become accustomed to so surprising data, over 80 million unique IPs were identified […]
Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin’s request to reinforce the garrison of the fifth domain, the cyber space, through a series of investment to secure national critical infrastructures […]
The worst nightmare for security experts, a backdoor hidden in large consume products, once again has become reality, several network appliances from Barracuda Networks Inc. contains a hidden hardware backdoor that allow to attackers to remotely control them. The backdoor, since now undocumented, has been disclosed by the same producer, the devices are configured to […]