Source: http://www.ectnews.com/story/79959.html
Author: Richard Adhikari
“After reading the paper, [I believe] it is indeed the most complex piece of malware ever discovered,” Sorin Mustaca, an IT security expert at Avira, told TechNewsWorld.
Sorin Mustaca on Cybersecurity
Thoughts on Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC
Source: http://www.ectnews.com/story/79959.html
Author: Richard Adhikari
“After reading the paper, [I believe] it is indeed the most complex piece of malware ever discovered,” Sorin Mustaca, an IT security expert at Avira, told TechNewsWorld.
How do you define cyberterrorism? The definition of cyberterrorism is since the 90s highly debated because it is not easy to define how devastating the damages of a computer attack are. However, according to many sources in the Internet, it appears that the definition of to the U.S. Federal Bureau of Investigation is the one […]
Originally published here: http://grahamcluley.com/2013/12/three-key-security-threats/ 1. Security breaches and hacks 2013 was the year that major security breaches and hacks really took hold. Millions of credentials were stolen from the likes of Twitter, Tumblr,Yahoo, Adobe and many others. Whenever data breaches like this occur, targeted attacks against the users of such wesbites can quickly follow. The targeted attacks usually consist […]
A new article of Michael O’Dwyer got published in IPSwitch: When Security Awareness Training Overwhelms Users, Can Technology Help? I am happy to say that I was the only one interviewed, so this is actually an exclusive interview with me. “I would say that humans are the biggest problem, because they are the weakest […]