Source: Nart Villeneuve, Trend Micro
The term “Watering Hole” has become a popular way to describe targeted malware attacks in which the attackers compromise a legitimate website and insert a “drive-by” exploit in order to compromise the website’s visitors.
Posts tagged “Cyber Crime”
Source: Aman Sharma, Economic Times
The government is gearing up to arm cyber sleuths with forensic tools to catch up with criminals who outsmart investigators by using secure mobile phones or password-protected computers.
Source: AP via The Washington Post
Microsoft says it has settled a computer-fraud case against a website operated by a Chinese businessman that had become a major hub for illicit Internet activity.
A shadowy but well organized hacker group in the Middle East has disrupted the electronic banking operations of America’s largest financial institutions in recent days.
Source: Tech Week Europe
Governments of both east and west, and large private businesses, are thought to be spending vast portions of their budgets on acquiring zero-day exploits.
Source: Trend Micro
This is part of a series of blog posts discussing the Chinese underground.
India should support the idea of TCBMs (transparency and confidence building measures) as a first step towards a code of conduct or eventual cybersecurity convention.
Source: Joseph Menn, Reuters
On March 9 of this year, a piece of Facebook software spotted something suspicious.
If your company were hit with a cyber attack today, how much would it cost?