Browsing: Attacks

News Attacks

How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks. The…


North Korea’s DDoS Attacks Analyzed Based on IPs

Arbor Networks has used the IP addresses shared recently by United States authorities to analyze distributed denial-of-service (DDoS) attacks attributed to the North Korean government. The security firm believes the…


Cameras Top Source of IoT Attacks: Kaspersky

Honeypots set up by Kaspersky Lab have provided some interesting information on Internet of Things (IoT) attacks, including the types of hacking attempts, attack sources, and the geographical distribution of…

1 2 3 9