Tags: fbiRemove, krebsRemove, malwareRemove

FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
EU launches cross border cyber crime taskforce  
Jul 25, 2014 | Comment Now 
Australia to assist in co-ordinating investigations.
 
New Mayhem malware targets Linux, UNIX servers 
By Juha Saarinen | Jul 18, 2014 | Comment Now 
Infections found in Australia and New Zealand.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Microsoft criticised for heavy-handed No-IP domain seizure 
 
Zeus variant uses encryption to evade detection 
 
Lawfully hacked 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
[Blog post] Police use of malware requires more debate.
 
Microsoft launches operation to disrupt cybercrime ring 
Jul 1, 2014 | Comment Now 
Kuwait and Algeria-developed malware exposed.
 
First Android ransomware nets thousands of victims 
By Juha Saarinen | Jun 10, 2014 | Comment Now 
Don't pay the extortionists.
 
Accused Russian hacker claims authorship of 'Zeus' malware 
Jun 3, 2014 | Comment Now 
FBI releases conversation transcripts.
 
US charges Russian man believed to be behind 'GOZ' botnet 
Jun 3, 2014 | Comment Now 
Accused of stealing banking credentials, distributing ransomware
 
Microsoft successfully challenges FBI data request 
By Juha Saarinen | May 23, 2014 | Comment Now 
Court documents unsealed today.
 
Social engineering on rise as vulnerabilities decline: Microsoft 
 
FBI warns healthcare info security is 'too lax' 
By Jim Finkle | Apr 24, 2014 | Comment Now 
Secret memo warns providers to lift their game.
 
LaCie's online payment system breached 
By Ashley Carman | Apr 16, 2014 | Comment Now 
Customer details exposed for almost a year.
 
Expansion of mass FBI biometrics database raises concerns 
By Juha Saarinen | Apr 15, 2014 | Comment Now 
Facial recognition of innocent people.
 
Google rolls out continual app security scan for Android 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote