Read more about cyber espionage
Bookmark and Share
  • iOS spyware used by Pawn Storm cyber spies

    04.02.2015

    Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on non-jailbroken devices.

  • APT gear: Custom Windows task hiding tool

    27.01.2015

    Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and exfiltrate information from them.

  • UK GCHQ collected emails of UK, US journalists

    20.01.2015

    British intelligence agency GCHQ has, at least on one occasion, slurped up emails sent by and to journalists working for a number of high-profile news organizations and shared their contents on its own intranet, the Guardian reported.

  • North Korean networks compromised by NSA for a while now

    19.01.2015

    A report based on documents from Edward Snowden's NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of the US National Security Agency, and gave an indication of how they knew who's to blame for the massive attack sustained by Sony Pictures Entertainment late last year.

  • Russian hackers stole millions from banks, ATMs

    22.12.2014

    Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals.




Spotlight

Banks and IT security: The elements of success

Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Mar 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //