Social Engineering
Tsunami of AI-driven attacks anticipated in 2024
Trend Micro urges industry-led regulation and innovative defense strategies
Specialized cloud-based ML models may be singled out for data poisoning attacks
Arabic cyber-espionage group on global attack spree
Kaspersky Lab’s Global Research and Analysis Team said it has discovered Desert Falcons, a cyber-espionage group targeting multiple high profile organisations and individuals, particularly from Middle East countries.
Fujitsu develops technology that identifies users vulnerable to cyber-attacks
Fujitsu Ltd and Fujitsu Laboratories Ltd have announced the development of what they claimed was the industry’s first technology for identifying users vulnerable to cyber-attacks based on the ways they use their computers, such as their e-mail and web activities.
(2013 Top 10 Story) Scammers in Malaysia up their game with social engineering
A young consultant has been scammed, and she’s just one amongst many. While the authorities and organizations concerned are aware of the on-going scam, they say they are hampered by the syndicate’s sophistication. Gabey Goh reports.
Govt malware, insider threats to dominate security landscape: CyberArk
The theft, misuse and exploitation of privileged accounts has become an increasingly key tactic in each phase of an advance persistent threat (APT) attack cycle, and this will largely continue into next year, said enterprise security solutions vendor CyberArk, outlining its security predictions for 2014.
Hackers taking rootkit exploits to the next level: F-Secure (Updated)
While there has been no single major event that dominated the information security threat landscape in the last half of 2012 as in previous years, several new trends are beginning to surface that should be of concern to both general consumers and enterprises, notes a new study.
Security threats: What to expect in 2013
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small. Check Point Software Technologies Ltd’s Rajlingam Sokalingam tells us what to expect.