Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.
A government watchdog group tasked with overseeing whether actions the President's executive office takes to combat terrorism don't throw civil liberties overboard in the process is taking aim at the National Security Agency's "PRISM" data-collection surveillance program.
Cisco today kicked off a contest with $300,000 in prize money that challenges security experts around the world to put together ways to secure what's now called the "Internet of Things," the wide range of non-traditional computing devices used on the electric grid, in healthcare and many other industries.
A year ago, Mandiant, since acquired by FireEye, issued a long report called "APT1" that accused China's People's Liberation Army of launching cyber-espionage attacks against 141 companies in 20 industries through a group known as "PLA Unit 61398" operating mainly from Shanghai.
The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them.
After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high.
How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference.
Network World's Daily Newsletter
Stay up to date with the most important tech news