Source: Tech Week Europe
Governments of both east and west, and large private businesses, are thought to be spending vast portions of their budgets on acquiring zero-day exploits.
Posts tagged “Malware”
Source: Anne Saita, Threat Post
The Santa Clara-based company released its Q2 Threat Report, in which its researchers say they’ve unearthed 1.5 million new pieces of malware this year.
The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare.
Source: Danny O’Brien, CPJ
We talk a lot about hacking attacks against individual journalists here, but what typifies an attempt to access a reporter’s computer?
Source: Electronic Frontier Foundation
As the violence escalates across Syria, so do the campaigns of targeted malware attacks against Syrian activists, journalists, and members of the opposition, which covertly install surveillance software on their computers.
Source: Dan Goodin, Ars Technica
Researchers have uncovered yet another state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East.
Source: Vernon Silver, Bloomberg
Gamma International said the company didn’t sell its FinFisher spyware to Bahrain, responding to research that showed activists from the Persian Gulf kingdom were targeted by what looked like the software, which can secretly monitor computers.
The Citizen Lab announces the publication of a detailed post analyzing several pieces of malware targeting Bahraini dissidents, shared with us by Bloomberg News. The analysis suggests that the malware used is "FinSpy," part of the commercial intrusion kit, Finfisher, distributed by the United Kingdom-based company, Gamma International.
Source: Dr. Web
Russian anti-virus company Doctor Web is warning users about a dangerous cross-platform Trojan horse that provides criminals with full control over infected machines and can render a system non-operational.