New research: Max Abrahms and Philip B.K. Potter, ” Explaining Terrorism: Leadership Deficits and Militant Group Tactics ,” International Organizations . Abstract : Certain types of militant groups — those suffering from leadership deficits — are more likely to attack civilians.
Both the mainstream media and our security media is abuzz with Kasperksys disclosure of their research on the Equation group and the associated malware. You can find the original blog post here: http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage But if you want some real detail, check out the Q http://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf Way more detail, and much more sobering to see that this group of malware goes all the way back to 2001, and includes code to map disconnected networks (using USB key CC like Stuxnet did), as well as the disk firmware facet thats everyones headline today.
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a…
Among the events of the past few days during the holidays was a DDoS attack on Sonys Playstation network and on Xbox Lives network. The attack was reportedly carried out by a group called Lizard Squad and by all measures is not precisely the profile of a highly sophisticated attack.
This is a guest diary submitted by Brad Duncan. For the past year or so, Ive noticed a particular group using a gate that redirects to an exploit kit (EK), usually Fiesta
Original release date: November 13, 2014 Systems Affected iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta. Overview A technique labeled “Masque Attack” allows an attacker to substitute malware for a legitimate iOS app under a limited set of circumstances. Description Masque Attack was discovered and described by FireEye mobile security researchers