Pages

Categories

Search

 

Cyberthreats

“Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that ha...

Hackers are now using Twitter to send coded update messages to computers they’ve previously infected with rogue code, according to a report from net-monitoring firm Arbor Networks. This looks to be the first reported case of hackers using the popular micro-messaging company to control botnets, whi...

The Olympic Games in London could suffer a severe “cyber attack” unless urgent action is taken, according to former home secretary David Blunkett. He said terrorists could hack into computer and communications systems causing a “complete meltdown”. The Labour MP said such an ...

For years, the U.S. intelligence community worried that China’s government was attacking our cyber-infrastructure. Now one man has discovered it’s worse: It’s hundreds of thousands of everyday civilians. And they’ve only just begun. (PopSci)...