Tag: Cyberattack

A simple example of a complex cyberattack

How cyberspies achieve their goals by using cheap tools and careful aiming We’re already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all …

Cyberattack options against North Korea limited

America’s advanced digital arsenal would be little help in a conflict against North Korea because the regime is so digitally disconnected, cyber warfare experts tell Cory. Obvious targets like power grids are mostly protected from widespread tampering thanks to the …

Trojanized CCleaner Investigation: Lucky Break

Backup Server Reveals Secondary Malware Hit Intel, VMware, Fujitsu and Others Researchers investigating the infection of hundreds of thousands of computers with a trojanized version of a popular software utility, CCleaner, have had a lucky break that gives greater insight into the …

A simple example of a complex cyberattack

We’re already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all of this may be done in much simpler ways, as was the …

Most UK councils hit by cyber attacks

A study has revealed that most UK local authorities have suffered cyber attacks in the past year, showing local government is a key target for cyber criminals and that legacy software is a top security concern  An iGov survey of …