Kaspersky Lab’s Global Research and Analysis Team said it has discovered Desert Falcons, a cyber-espionage group targeting multiple high profile organisations and individuals, particularly from Middle East countries.
Fujitsu Ltd and Fujitsu Laboratories Ltd have announced the development of what they claimed was the industry’s first technology for identifying users vulnerable to cyber-attacks based on the ways they use their computers, such as their e-mail and web activities.
A young consultant has been scammed, and she’s just one amongst many. While the authorities and organizations concerned are aware of the on-going scam, they say they are hampered by the syndicate’s sophistication. Gabey Goh reports.
The theft, misuse and exploitation of privileged accounts has become an increasingly key tactic in each phase of an advance persistent threat (APT) attack cycle, and this will largely continue into next year, said enterprise security solutions vendor CyberArk, outlining its security predictions for 2014.
While there has been no single major event that dominated the information security threat landscape in the last half of 2012 as in previous years, several new trends are beginning to surface that should be of concern to both general consumers and enterprises, notes a new study.
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small. Check Point Software Technologies Ltd’s Rajlingam Sokalingam tells us what to expect.