Stuxnet

Kaspersky Lab discovers the ancestor of Stuxnet, Flame
Kaspersky Lab’s Global Research and Analysis Team (GReAT) has discovered a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades – the Equation Group.
Govt malware, insider threats to dominate security landscape: CyberArk
The theft, misuse and exploitation of privileged accounts has become an increasingly key tactic in each phase of an advance persistent threat (APT) attack cycle, and this will largely continue into next year, said enterprise security solutions vendor CyberArk, outlining its security predictions for 2014.
Spy vs spy, apples vs oranges
Let’s not allow government indecisiveness or our fellow Malaysians’ apathy stop us from holding the US Government accountable for its actions, argues A. Asohan.
5 steps for securing SCADA environments
The attack by the Stuxnet virus against Iran in 2010 raised awareness of the vulnerability of industrial systems known as SCADA, which have been widely implemented across a range of industries for many years. The Stuxnet virus illustrated the urgent need to apply to SCADA environments modern security techniques like those deployed in an enterprise network, writes Fortinet’s George Chang.
Cyber-espionage and weapons on the rise in Q1: Kaspersky
The first three months of the year turned out to be full of incident, especially when it came to cyber-espionage and cyber-weapons, the experts at Kaspersky Lab said in their latest report.
Govt malware: Why and how it’s used, and is it cyber-war?
Governments use malware to spy on other nations, but how is such cyber-espionage carried out? F-Secure Labs provides some insight.
Cyber-war: Time for our agencies to step up
In the wake of reports of cyber-warfare raging between Malaysian and Filipino hackers, it is high time for the various agencies we have in Malaysia to get together and prepare a proper national cyber-security plan, argues A. Asohan.
Kaspersky identifies MiniDuke, malware that spies on govts and others
Kaspersky Lab’s team of experts published a new research report that analyzed a series of security incidents involving the use of the recently discovered PDF exploit in Adobe Reader (CVE-2013-6040) and a new, highly customized malicious program known as MiniDuke.  
With the world safe, here are predictions for 2013
F-Secure Labs gives us a rundown on what could be in store for 2013, from covert government cyber-operations to smart TV hacking and Malware-as-a-Service!
Kaspersky discovers ‘miniFlame,’ designed for highly targeted cyber-espionage
Kaspersky Lab has announced the discovery of miniFlame, which it described as a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber-espionage operations.
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021