U.S. Cyber Command shares malware samples to help thwart bad actors in cyber security

That’s why U.S. Cyber Command has been embracing collaboration with political allies and members of the cyber security community. In a brief media release, Cyber Command officials say they plan to share unclassified malware samples that will have the greatest … Continue reading

First Malware to Attack Industrial Control Safety Systems | EE Times

Less than two months after October’s U.S. Department of Homeland Security/FBI joint technical alert confirmed cyberattacks against industrial control systems, a new type of malware targeting industrial processes struck an unnamed critical infrastructure facility. The TRITON/TRISIS/HatMan malware is the first … Continue reading

This Tricky Malware Has Been Lying in Wait | Nextgov

The malware code spies on PCs through a multi-layer attack using a kernel mode module and a user mode module that essentially gives attackers unlimited access to an infected machine. They can steal passwords, keyboard strokes, screenshots, network traffic and … Continue reading

India and Pakistan hit by spy malware – cybersecurity firm

To install the malware, Symantec found, the attackers used decoy documents related to security issues in South Asia. The documents included reports from Reuters, Zee News, and the Hindu, and were related to military issues, Kashmir, and an Indian secessionist … Continue reading

Can the U.S. stop malware and buy it at the same time? | FCW

The National Security Agency, the FBI and elements inside the Department of Homeland Security are responsible for discovering flaws in existing software, alerting private companies and the public of their vulnerability and prosecuting malicious actors who create and sell these … Continue reading

New IoT malware strain uncovered | IoT Hub

The Linux/IRCTelnet-based software was discovered by security researchers at MalwareMustDie.org, and like the Mirai botnet that was used to attack DNS provider Dyn, it relies on default hard-coded credentials to spread across vulnerable devices. The malware is primed for DDoS … Continue reading

IRS warns: 400% flood in phishing and malware this tax year alone | Network World

The IRS said that when citizens people click on these email links, they are taken to sites designed to imitate an official-looking website, such as IRS.gov. The sites ask for Social Security numbers and other personal information. The sites also … Continue reading

Check Out These Vintage Computer Viruses at the Malware Museum | Smithsonian

“Most of the malware we analyze today is coming from organized criminal groups…and intelligence agencies,” Mikk Hyppönen tells Zoe Kleinman. “Old school happy hackers who used to write viruses for fun are nowhere to be seen.” Source: Check Out These … Continue reading

Cybersecurity is a ‘con,’ malware entrepreneur says

John Prisco, CEO of Triumfant Security, wrote in a recent article for The Next Web that the cybersecurity industry is a “con” and that vendors are selling software that they know doesn’t work. “This scam makes them arguably more corrupt than the … Continue reading

Security lessons from the NSA malware defense report

The 11 best practices include: implementing strong network segmentation, protecting administrative accounts, deploying security monitors, keeping software updated and monitoring logs from security controls. The final section of the report focuses on incident response planning for destructive malware. The basic … Continue reading