Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.
Researchers recently discovered a new spyware campaign that used cyber-squatting techniques to distribute the AgentTesla keylogger via a domain whose name was strikingly similar to the consulting firm Diode Technologies.
The cyber-espionage group identified as Strider by Symantec researchers is as sophisticated a threat as any known APT in history -- including Duqu, Flame, The Equation Group and Regin -- according to an analysis by Kaspersky Lab.
Circumstantial evidence suggests a link between the Stealth Falcon spyware campaign and the UAE government.
A supposedly legitimate French software firm, Tuto4PC, has actually infected an estimated 12 million PC users with a generic Trojan disguised as downloadable utilities programmes, according to an analysis from Cisco's Talos research division.
Researchers have discovered a new family of malware that hides behind legitimate digital certificates and spies on the infected device.
Symantec has discovered a new mobile spyware it is calling Android.Spywaller which uses a legitimate security tool to spoof its way onto a device, specifically those found in the Chinese market.
A new scheme has been uncovered making use of an old trick: capturing users who click on a link with a com[dot]com extension that will lead to fake websites.
Failure to see eye-to-eye over a non-disclosure agreement kept Boeing subsidiary Insitu and Hacking Team from creating a drone/spyware chimera.
Russian government agencies have detected foreign-controlled spyware networks in the country, and a host of compromised devices, leading to moves to adopt quatum computing solutions.
There are as many as a dozen variants of the Superfish bloatware found last week on Lenovo laptops, it has been discovered.
Equation Group, the most advanced threat actor yet seen according to Kaspersky, may be the NSA.
This week's ICYMI column reviews the top stories on SC last week, from an espionage group targeting Apple iOS devices to Internet of Things flaws and privacy concerns around Outlook.
Samsung's latest line of internet-connected 'smart' TVs capture conversations through its Voice Recognition software, before sending this information onto third-parties.
A prolific cyber-espionage group has been actively targeting politicians, journalists, military and other entities by using spyware against Apple iOS devices.
The latest ICYMI column looks at the biggest stories on SC this week, including worrying news on EU data protection laws, claims of iPhone spyware and new Flash Player zero-days.
A good spying programme in the 21st century cannot exist without good covert spyware. So it's time to put a military discipline behind defending our state IT infrastructure says Ralf Benzmüller.
Every sensor has the potential to be used for malicious logging - and anti-virus based systems aren't an effective defence says Janusz Siemienowicz who adovcates monitoring of behaviour.
The British government today published details of its proposed anti-terror law, and subsequently faced fresh questions on surveillance and the mixed messages given out to local cyber-security start-ups.
Open source software capable of detecting the presence of surveillance spyware has been released by four European and US human rights and IT organisations.
A sophisticated cyber-espionage campaign uses Wi-Fi and a backdoor to trick travelling C-level execs into downloading "Darkhotel" spying software.
UK and US spies reported to spy on Deutsche Telekom in Snowden documents, while Germany's FinFisher accused of supplying surveillance software to repressive regimes.
Here are the five most popular articles, as read by you the reader, in the week for August 8 to 14.
Gamma International Ltd - an Anglo-German company that makes and sells FinFisher spyware to various European, American and Asia Pacific governments and law enforcement agencies - has been bit by a big data breach, revealing hundreds of confidential documents.
Charles Sweeney asks, are your staff inadvertently leaving the back door open via an innocent lunch-time browse?
Attack vectors demonstrate the sophistication of malware available to cyber-criminals globally, says CheckPoint MD Keith Bird.
The German software revelation may have come from a second NSA leak/source other than Edward Snowden, says cryptography expert Bruce Schneier.
As many as 21 governments are said to have used the "untraceable" Remote Control System (RCS) spyware being sold by the Milan-based Hacking Team.
Tens of thousands of smartphone users have been hit by a new class of botnet that illicitly gathers information.
The Government Communications Headquarters (GCHQ) is to scrutinise Chinese telecoms technology used in the UK's communications infrastructure.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry