article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess.

Malware 167
article thumbnail

IoT malware clashes in a botnet territory battle

Network World

Mirai -- a notorious malware that's been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack internet-of-things products, with a resiliency that surpasses Mirai, according to security researchers.

Malware 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Extremely bad’ vulnerability found in widely used logging system

The Verge

Security teams at companies large and small are scrambling to patch a previously unknown vulnerability called Log4Shell, which has the potential to let hackers compromise millions of devices across the internet. The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet.

System 142
article thumbnail

Lessons Learned: Are you one of the Fortune 500’s Unfortunate 221?

CTOvision

According to information gathered from open Internet sources (especially pastebin-type sites), 44% of Fortune 500 companies have employees with leaked credentials on the open web. Analysis CTO Cyber Security DoD and IC Dropbox Information sensitivity JavaScript Malware microsoft Outlook Web App Phishing Trend Micro'

Malware 287
article thumbnail

FBI Provides An Update On #SonyHack Investigation Including Some Tech Details On Attribution

CTOvision

The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. Analysis CTO Cyber Security Cyberwar FBI sonyhack'

Malware 348
article thumbnail

Google Announces Links within Mobile Apps

CTOvision

For websites with lots of Internet traffic, turning visits into profits with successful advertising is immensely important. Google removes Android malware used to secretly mine bitcoin (mercurynews.com). CTO Gadgets Mobile Ad rotation Advertising AdWords Android Google Jerry Dischler Online advertising Web search engine'

Mobile 262
article thumbnail

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more

CTOvision

Developers Scramble to Build NSA-Proof Email – “Edward Snowden’s revelations about the NSA’s mass internet surveillance is driving development of a slew of new email tools aimed at providing end-to-end encryption to users, and it has boosted interest in existing privacy tools too.” Via Tennessean, more here.