South-East Asia remains a target for state-sponsored APT groups, and faces new risks from territorial disputes expanding into cyber-attacks.
FireEye Inc has released Operation Saffron Rose, a research report detailing the activities of a cyber-espionage group likely based in Iran.
With a cyber battle between Filipino and Malaysian hackers erupting over the weekend as a result of the standoff in Lahad Datu, Sabah, the Philippines Government is now speeding up plans to host all government-owned sites as part of a new unified security strategy.
In the wake of reports of cyber-warfare raging between Malaysian and Filipino hackers, it is high time for the various agencies we have in Malaysia to get together and prepare a proper national cyber-security plan, argues A. Asohan.
The online shopping site of Globe Telecom became a collateral damage of a new hacking war that has exploded between the Philippines and Malaysia on Sunday, March 3.
Kaspersky Lab’s team of experts published a new research report that analyzed a series of security incidents involving the use of the recently discovered PDF exploit in Adobe Reader (CVE-2013-6040) and a new, highly customized malicious program known as MiniDuke.
Kaspersky Lab has published a new research report which identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least the last five years.
F-Secure Labs gives us a rundown on what could be in store for 2013, from covert government cyber-operations to smart TV hacking and Malware-as-a-Service!
A resurgence of large scale distributed denial of service (DDoS) attacks has put the heat on organizations around the world to ensure they are protected against the possibility of attack. DNA speaks to Tata Communications' head of Managed Security Solutions Eric Hemmendinger for his take on the threat landscape.
Kaspersky Lab has announced the discovery of miniFlame, which it described as a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber-espionage operations.