Security News
Computer recovery code plays double agent on users LoJack software, designed to rat on computer thieves, appears to be serving a double purpose by also working with a Russian state-sponsored hacking team.…
Evidence continues to mount that Russian intelligence created the "Guccifer 2.0" hacker online persona as a "plausible deniability" cover for dumping information stolen from the U.S. Democratic...
DNC Hackers Target Lawmakers With Decoy Sites; Some Senators Demand ActionThe cyber espionage group that executed a campaign against the Democratic Party has been gearing up to attack the U.S....
Cybercriminals, including state-sponsored hackers, have started actively exploiting a newly discovered Microsoft Office vulnerability that Microsoft does not consider as a security issue and has...
The cyber espionage group known as Fancy Bear, which is widely believed to be backed by the Russian government, has been abusing Google’s Blogspot service in recent phishing attacks. read more
Hackers Go Phishing for Cybersecurity Conference Attendees With Decoy DocumentWant to infect systems used by a large swath of cybersecurity professionals in one go? Then use a malicious decoy...
FireEye Says the Hackers Are Launching Sneaky Hotel Wi-Fi AttacksFireEye says Russia's Fancy Bear hackers are targeting hotel guests with a sneaky attack that leaves no traces and steals network...
FireEye Says the Hackers Are Launching Sneaky Hotel Wi-Fi AttacksFireEye says Russia's Fancy Bear hackers are targeting hotel guests with a sneaky attack that leaves no traces and steals network...
Analysis: Malicious Code-Writing Teams Versus Billable Hours: Fair Fight?To battle Russian hackers, Microsoft has moved to strip them of their malicious infrastructure. To do so, however, the...
"Redirecting…Strontium domains will directly disrupt current Strontium infrastructure."