Businesses risk becoming “collateral damage” in nation-state cyber wars
Plan now to minimise consequences if attacks escalate “beyond proportionality”, ex-FBI cyber expert advises
David Braue | 13 Aug | Read more
Plan now to minimise consequences if attacks escalate “beyond proportionality”, ex-FBI cyber expert advises
David Braue | 13 Aug | Read more
FBI fingers notorious North Korean hacking group for new malware that allows attackers quickly steal information.
North Korean hackers’ use of gaming hacks has become one of numerous strategies they have successfully used to stay under the radar of international law-enforcement authorities, according to a threat-intelligence researcher who warns the world has long underestimated the rogue state’s use of criminal activities to raise money.
David Braue | 19 Oct | Read more
Fake app and fake company, but legitimate digital certificates.
Is Ryuk another ransomware from North Korea's infamous Lazarus group?
Kaspersky reveals Olympic Destroyer attack aimed at Europe a week after EU votes to ban its products at EU institutions.
New details emerge about North Korea’s old malware tools.
Fake Facebook profiles and bogus Android apps in Google Play offer North Korean hackers an eye across the border.
North Korean hackers have developed new malware that will destroy machines it infects.
People of interest to North Korea should update or disable Flash Player.
Is North Korea developing cryptocurrency mining malware to bypass economic sanctions?
With all the talk associated with North Korea's prospects of launching a nuclear attack, there is often an overlooked, existential threat that continues to fly under the radar - cyber attacks.
Eric O’Neill | 10 Nov | Read more
Big-name security tools aren't catching anywhere near all of the malware they are presented with, according to the latest lab testing results from Enex Labs, which found during testing in the second half of 2014 that as many as 100 percent of tested malware was making it through the defences of eight popular security tools. The results were corroborated by a FireEye study that found traditional security defences simply are not stopping security breaches.
David Braue | 19 Jan | Read more
Security experts are likely to remain unsatisfied with an explanation by the Federal Bureau of Investigation’s boss as to how they linked North Korea to the attacks on Sony.
In what has been one of the most momentous years in infosec ever - the Sony hack has topped everything. Although the Sony hack did not impact as many people directly as Apple's "goto: fail" bug or the Heartbleed exploit, the commercial and political ramifications of the attack on Sony have garnered more attention than any other attack - surpassing even the target attack in November 2013.
Anthony Caruana | 25 Dec | Read more