Read more about cyber espionage
Bookmark and Share
  • Anthem breach dates back to December

    06.02.2015

    As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack.

  • iOS spyware used by Pawn Storm cyber spies

    04.02.2015

    Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on non-jailbroken devices.

  • APT gear: Custom Windows task hiding tool

    27.01.2015

    Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and exfiltrate information from them.

  • UK GCHQ collected emails of UK, US journalists

    20.01.2015

    British intelligence agency GCHQ has, at least on one occasion, slurped up emails sent by and to journalists working for a number of high-profile news organizations and shared their contents on its own intranet, the Guardian reported.

  • North Korean networks compromised by NSA for a while now

    19.01.2015

    A report based on documents from Edward Snowden's NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of the US National Security Agency, and gave an indication of how they knew who's to blame for the massive attack sustained by Sony Pictures Entertainment late last year.




Spotlight

Planning for the Internet of Things

As organizations plan for the future, and how security has to operate within their business, they now have to worry about the IoT. Geoff Webb, Director of Solution Strategy at NetIQ, discusses the implications and likely impact of the Internet of Things.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Apr 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //