The destructive code that was used to infect and erase hard drives at Sony Pictures Entertainment - and which apparently was the subject of a recent FBI "flash alert" - has been identified as "wiper" malware known both as Destover and Wipall.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
In the wake of the FBI issuing a warning that a U.S. business, reportedly Sony Pictures Entertainment, has been attacked using a dangerous form of "wiper" malware, security experts weigh in on the news and offer mitigation advice.
A confidential FBI "flash" alert is warning of "wiper" malware attacks - that delete hard drive content - against U.S. businesses. Security experts say the alert is tied to the hack of Sony Pictures Entertainment, which may be linked to North Korea.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
Retailers say tokenization and encryption are critical to ensuring payment card data security. Aite's Natalie Reinelt describes how merchants will use layers of security to protect data at the point of capture.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
Anti-virus firms Symantec, F-Secure, and Kaspersky Lab have been criticized for not issuing public alerts more quickly about powerful Regin espionage malware that has capabilities that reportedly rival Stuxnet and Flame.
Less than 48 hours after warnings first surfaced about espionage malware called "Regin," debate rages over who's been running the related attack campaigns, for what purpose, and if anti-virus vendors should have sounded warnings more quickly.
Stealth espionage malware known as 'Regin' or 'Regis' has been targeting government agencies, businesses and research institutes, with Russia and Saudi Arabia as prime targets, researchers say. But it's unclear what nation is behind the attacks.
Citadel financial malware has been upgraded to steal master passwords for software designed to securely store lists of usernames and passwords, according to IBM's Trusteer unit. Security experts offer insights on how to respond to the threat.
European police have announced the arrests of 15 alleged users of remote-access Trojans, which can be employed by attackers to spy on webcams, launch DDoS attacks, steal financial details and launch extortion campaigns.
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.