Search Results for "" malware ""
Cybercriminals Find New Ways to Exploit Vulnerabilities
Mobile Tech Slammed by Malware
Asymmetric Cyberwarfare Demands a New Information Assurance Approach
The planners of the Defense Department Joint Information Environment, or JIE, must specify the requirements that can cope with the surges in asymmetric cyberwarfare—now.
Malware Beware!
A group of technicians in various international locations is striving to stay at least one step ahead of cybervillains thr
Web 2 the DANGER ZONE
Cyber Investigators Analyze South Korea Malware
The malware that infiltrated computer systems across South Korea’s banking and television broadcast industries on March 20 shares similarities with the Shamoon program used last year to wipe clean
Critical Infrastructure Ripe for Attack
Digital marauders have set their sights on the critical infrastructure and are likely to strike soon with major effect. Several different elements of the infrastructure are vulnerable to attack by all manner of cyberspace players ranging from malevolent individuals to hostile nation-states.
![Fig. 1 [circuit-traces-640.jpg]: Cyberspace is the new invasion route for marauders to attack the nation’s critical infrastructure, and that potential threat now is increasing to the point of likelihood.](/sites/default/files/styles/4_3_small/public/media/images/migrated/circuit-traces-640.jpg?h=7c8928e8&itok=HqppXe5h)
Startup Company to Provide Malware Analysis

Corporate Data Breach Report Sheds Light on Intrusions
The “2015 Verizon Data Breach Investigations Report,” released this spring, states that the top three industries affected by cybermarauders are public, information and financial services. This is unchanged from the annual report’s results last year. The report adds that the estimated financial loss from 700 million compromised records totals $400 million.
Ransomware Booms as Cyber Attackers' Method of Choice
