When an attacker targets someone or some organization (target) to obtain or change information using ways that are difficult to detect and exploit. Attackers use advanced mechanisms to perform he…
In the recent past, Middle Eastern companies are becoming a frequent target of attackers. Malware attack at the Saudi Aramco oil company is the latest in these series. News sources…
Kaspersky Labs announced its new finding on the cyber warfare space, FLAME, indicating that the cyberwar landscape is taking new dimensions. The new malware named Flame is located in the…
The Anonymous hacker collective twitter handle is being followed by more than half million people on twitter. All these followers may not be supporting the Hacktivism by the Anonymous group,…
Today while checking the network connections I found something strange. The KeisTrayAgent running on my PC is connecting to some IP Address in the internet. It seemed something strange and…
In the last two weeks, there is a lot of hacking events occurred in the middle east region. Supporters of two countries have exchanged cyber warfare showing their might. In…
Phishing is a very common means of social engineering in these days. Despite the increased efforts by Banks and other organizations, there is still a good number of people fall…
Disk space attacks are a form of resource utilization attacks resulting in denial of service. Disk space if a finite resource in the computers. If it is fully utilized, systems…
Stuxnet: Anatomy of a Computer Virus from Patrick Clair on Vimeo. An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This…