The threat of cyber attack loomed over the opening ceremony for the London Olympics last year, officials have revealed.
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.
A Russian security researcher Nikita Tarakanov has found Huawei’s 3G and 4G devices vulnerable to the hackers. He has reported this matter...
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate...
Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the...
The Washington Post reports that the Pentagon has approved a major expansion of its cyber security force which will result in a...
The Anonymous hackers have hacked and defaced the official website of U.S. Sentencing Commission (http://www.ussc.gov) working directly under the Justice Department for their operation #opLastResort. The...
In a shocking news reported by Chinese media, the security researchers have reveled that there are more than a million smartphones in...
The EU’s cyber security agency ENISA has published its Cyber Threat Landscape analysis of 2012 which puts drive-by-exploits as the top web...
Apple has been in news with concerns over it’s products since it’s iPhone 5 launch. But, those news aren’t the ones to...
A country which is probably the 7th best amongst world’s top defense countries doesn’t have any legalized cyber crime laws in the...
A group of hackers who call themselves ”Islamic Jihad” has claimed to send thousands of emails in support of Gaza to 5000...
Online hackavist group Anonymous has announced that they will now going one step further, this time the hackavist group will attack international...
News.Softpedia came up with an interesting update on hackavist groups like Anonymous and RedHack, according to which Anonymous hackers have threatened Turkey for adding RedHack group on...
A common man when thinks about cyber terrorism or cyber crime, they think it may be just an illegal activity over some...
This is a just a short post to make available the security awareness slides that I was using at the RSA Conference...
Our interim analysis of a version of the malware we detect as Java/Boonana.A or Win32/Boonana.A (depending on the particular component of this...
...a piece at Discovery News about 5 Unexpected Threats of Online Social Networking...
Insider Threat – your ATM may now be hacked from the inside. According to Wired’s Threat Level Blog… A Bank of...
As usual, ESET has released its monthly Global Threat Trends Report, which will be available in due course at http://www.eset.com/threat-center/index.php. There are...
ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by...