article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. In what is commonly referred to as the most destructive and costly cyber attack ever, the conspirators unleashed the 'NotPetya' malware. The GRU's Olympic Destroyer malware. and a large U.S.

Malware 65
article thumbnail

A rose by any other name - A Screw's Loose

A Screw's Loose

I had a chance today to participate in a Twitter chat focused on the mobile business ( #mobilebizchat ). The topic of today’s chat was focused on Enterprise Mobile Apps. The major issue here though, was no one had bothered to define what an enterprise mobile app was and it made the conversation awfully difficult.

Mobile 53
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why BYOD doesn't really matter or how I learned to embrace a.

A Screw's Loose

Why BYOD doesn’t really matter or how I learned to embrace a mobile strategy Part 1. What is required is a mobile strategy. When this mobile strategy is done correctly, BYOD is already covered should an organization choose to follow that route. So, what do you need to have as part of you mobile strategy to be successful.

Mobile 74
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Certainly they use your mobile number or if you logged in you account information, but they also listen to your voice as you navigate the call center questions, authenticating your voice from the last time you called. Such as training systems to automatically detect malware.