Page: Critical Limited Edition Malware Targets Defense Industry

Page: Critical Limited Edition Malware Targets Defense Industry

The attack starts with a legitimate-looking PDF file

Researchers Demonstrate CRIME Attack Against TLS Protocol [Video]

Researchers Demonstrate CRIME Attack Against TLS Protocol [Video]

The experts who presented the BEAST attack return with a new discovery

Poor Protocol Implementation Makes EMV Chip-and-PIN Cards Vulnerable

Poor Protocol Implementation Makes EMV Chip-and-PIN Cards Vulnerable

Cambridge researchers may have come up with an explanation for "phantom" withdrawals

Shamoon Created by American-Hater Amateur Developers

Shamoon Created by American-Hater Amateur Developers

Kaspersky experts have further analyzed the malware

Buggy Malware Found to Target French Nuclear Power Company

Buggy Malware Found to Target French Nuclear Power Company

Norman researchers are uncertain if it's a flawed attack or simply a way to confuse them

DarkShell Keylogger Comes as Windows Help File

DarkShell Keylogger Comes as Windows Help File

Innocent-looking files can hide dangerous malware

Cybercriminals Could Take Phishing to the Next Level by Using URIs

Cybercriminals Could Take Phishing to the Next Level by Using URIs

Henning Klevjer analyzes such attacks in his latest research paper

Teens Get Bullied Online, but Parents Are Unaware of Their Activities, Study Finds

Teens Get Bullied Online, but Parents Are Unaware of Their Activities, Study Finds

“The Digital Divide: How the Online Behavior of Teens is Getting Past Parents” released

Fujitsu, eBay and Verizon Team Up for Big Data Working Group

Fujitsu, eBay and Verizon Team Up for Big Data Working Group

Cloud Security Alliance’s new project has been launched

Experts Demonstrate Hotel Room Lock Hack, Improve Methods [Video]

Experts Demonstrate Hotel Room Lock Hack, Improve Methods [Video]

Some of the new gadgets can fit inside an iPhone case

Researchers Unable to Link Mysterious Wiper Malware to Flame

Researchers Unable to Link Mysterious Wiper Malware to Flame

There's not enough evidence to connect it to Duqu and Stuxnet either

Shylock Malware Replaces Documents with Shortcuts to Malicious Files

Shylock Malware Replaces Documents with Shortcuts to Malicious Files

This is possible thanks to a component called DiskSpread

Developers Improve Mahdi, Add Fifth Command and Control Server in Canada

Developers Improve Mahdi, Add Fifth Command and Control Server in Canada

150 organizations from all around the world have been targeted so far

Security Overview of Berlin 2012 Campus Party [Video]

Security Overview of Berlin 2012 Campus Party [Video]

The founder of Vulnerability Labs told Softpedia all about the hackathon

Windows 7 and Windows 8 Registries Reveal Password Hints, Researchers Find

Windows 7 and Windows 8 Registries Reveal Password Hints, Researchers Find

The hints are encrypted, but they’re not difficult to decrypt

Frankenstein: Undetectable Malware Created from Pieces of Common Software

Frankenstein: Undetectable Malware Created from Pieces of Common Software

University of Texas researchers show that code from Notepad could be used to build malware

Ransomware: Bad Guys, Good Guys and Untraceable Money Transfer Systems

Ransomware: Bad Guys, Good Guys and Untraceable Money Transfer Systems

ESET experts detail the way a ransomware scheme works

 
Want more? Browse: