Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.
The destructive code that was used to infect and erase hard drives at Sony Pictures Entertainment - and which apparently was the subject of a recent FBI "flash alert" - has been identified as "wiper" malware known both as Destover and Wipall.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks
and advanced threats can easily evade these controls.
Read the Q&A transcript featuring Damballa CTO Brian Foster. Discussion topics...
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Although it has been around for years, it has recently come back into the spotlight with Gartner's
research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of...
In the wake of the FBI issuing a warning that a U.S. business, reportedly Sony Pictures Entertainment, has been attacked using a dangerous form of "wiper" malware, security experts weigh in on the news and offer mitigation advice.
Capturing the detailed actions of privileged users is even more critical in today's business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. Also, every major compliance regulation requires organizations to document what users actually...
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats.
Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence.
Download this report to learn:
The eight most significant cybersecurity threats that could impact your...
Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.
High-privilege access is one of the most sensitive aspects of IT. Administrative accounts have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. When used in ways not intended, the impact of this capability can cause a wide spectrum of damage, from security threats...
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.