The former contractor reportedly spent 20 years pilfering government secrets and helping himself to the cream of the NSA’s hacking tools library.
Source: Former NSA contractor indicted over 50TB gov’t classified data theft | ZDNet
An installer purporting to be Microsoft Security Essentials is actually malware that can lead to a support call scam.
Source: Fake Microsoft Installer Hicurdismos Leads to Malware, Support Call Scam | Threatpost | The first stop for security news
IoT devices running the authentication protocol OpenSSH are being compromised and used as proxies in attacks that aim to take over accounts at popular web services,
Source: Akamai Warns of Account Takeovers Staged from Cameras, Routers
Necromancer-loving author wrote ‘tricky’ malware at its core
Source: Eye of Sauron-themed trojan targets Russia, Sweden • The Register
Find out if you’re under cyber-attack here #CyberSecurityMap #CyberSecurity #CyberWar
Source: Kaspersky Cyberthreat real-time map
System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.
Source: Why System Administrators Are So Crucial to Security
It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was out for revenge.
Source: Citibank IT guy deliberately wiped routers, shut down 90% of networks
Cybercriminals are sneaking banking Trojans onto systems via the legitimate remote-access tool Ammyy Admin, researchers at Kaspersky Lab warn. The attacks are a
Source: Trojanized Remote-Access Tool Spreads Malware
Power sensors for distribution networks have inspired a $77-million DARPA program to build a suite of automated cyberdefenses for power grids
Source: Detecting Cybersecurity Threats by Taking the Grid’s Pulse – IEEE Spectrum