File-less malware attacks leave little trace, which makes them all the more threatening. A file-less malware attack doesn’t even need to install software on a victim’s machine and is instead based on an attacker taking control of something already installed on your computer. A file-less malware attack often latches onto a built-in component of Windows … More What exactly is a file-less malware attack and how could it affect your business?
Aiming to protect critical infrastructure against attacks. Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are horribly insecure, there is … More Black Hat: Protecting Industrial Control System
Use of software by law enforcement as a surveillance tool is a real concern for groups. Amazon has come under fire from civil rights groups in the US that say their online service that identifies faces in images could be abused by law enforcement. The American Civil Liberties Union (ACLU) released a statement on Tuesday asking the … More Amazon Rekognition a possible threat to the civil rights of citizens
Written by Peter Stancik, ESET We Live Security Last month, ESET researchers confirmed the discovery of a new type of sophisticated malware now known as Industroyer, highlighting the threat posed to industrial control systems. Indeed, this is considered to be the first-ever designed to affect ICS industrial control systems directly, and is thought to be behind the December … More Industrial control security practitioners worry about threats … for a reason