North Korea’s access to the Internet has been hit with outages and is offline today, according to a network-monitoring company, days after the U.S. government accused the country of hacking into Sony Corp.’s files.
But they do know this: a newly-uncovered cybersecurity threat appears to have been designed by a government, and is “groundbreaking and almost peerless.”
China recently hacked into U.S. weather and satellite systems, forcing cybersecurity teams to seal off vital data, officials said Wednesday. (more…)
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike. (more…)
Evgeniy Bogachev, said to be known as “lucky12345″ and “slavik”, is accused of being involved in attacks on more than a million computers. (more…)
Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it? (more…)
It looks like hackers have hit Basecamp with a distributed denial-of-service (DDoS) attack and are demanding that the company pay a ransom. (more…)
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks is usually either to pay up or suck it up. This post offers a few pointers to help readers avoid becoming the next victim. (more…)