Blog Posts Tagged with "Middle East"
November 25, 2012 Added by:Pierluigi Paganini
W32.Narilam is a worm that attempts to spread by copying itself to all drives and certain shared folders on the compromised computer, the malware doesn’t include modules to steal information from the victims....
October 31, 2012 Added by:Pierluigi Paganini
Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in fact, both states are boosting investment in the development of their cyber capabilities...
July 30, 2012 Added by:Pierluigi Paganini
In Middle East, the number of malware that have been developed for state sponsored projects surely represents an anomaly. All the examples provided are evidence of the intent of governments to hit their enemies in the cyberspace to steal sensitive information or to destroy their critical infrastructure...
July 19, 2012 Added by:Pierluigi Paganini
The Mahdi attack is based on two well known techniques used to deliver malicious payloads, and the huge quantity of data collected reveals the real targets of the operation are government agencies, critical infrastructure engineering firms and financial houses...
July 18, 2012 Added by:Headlines
"It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing..."
June 18, 2012 Added by:Dan Dieterle
Russia has very advanced cyber capabilities, and they have shared military hardware and tech with middle east nations before. It is not a big leap to think that they could and would share cyber warfare technology with these nations, especially if they rely on these nations for energy reserve...
February 07, 2012 Added by:Pierluigi Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
January 29, 2012 Added by:Rafal Los
You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013