Tag Archive for: Tactics

The change in hacker tactics – and security technologies to thwart them – CSO Online


CSO Online

The change in hacker tactics – and security technologies to thwart them
CSO Online
According to “Cisco 2017 Midyear Cybersecurity Report” exploit kit activity has been declining dramatically since last year. Exploit kit is known to target vulnerabilities in Adobe Flash, Microsoft Silverlight, and Microsoft Internet Explorer

exploit kit – read more

ElTest malware campaign changes tactics, scraps use of gates and obfuscation – SC Magazine


SC Magazine

ElTest malware campaign changes tactics, scraps use of gates and obfuscation
SC Magazine
The long-lived ElTest malware campaign that infects victims through compromised websites evolved once again in the last quarter of 2016, ending its use of exploit kit gates and obfuscation, according to researchers with Palo Alto Networks' Unit 42

exploit kit – read more

Obama and Clinton weigh in on cyber warfare tactics – TechCrunch


TechCrunch

Obama and Clinton weigh in on cyber warfare tactics
TechCrunch
Russia's recent intrusions into American political organizations' networks are driving discussions about the rules of engagement for cyber warfare, and forcing America's own hacking of foreign governments into the light. President Barack Obama told
President Obama warns of 'cyber arms race' with RussiaDigital Journal
U.S. investigates Russian plan to disrupt the 2016 electionPulse Headlines
Obama says he doesn't want 'wild West' cyberwar with RussiaWashington Times

all 16 news articles »

cyber warfare – read more

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.

The goals of the offensive are to disrupt communications within ISIS and between the group and potential recruits, according to a story in the New York Times.

To meet those goals, U.S. Cyber Command could use such means as DDoS and man-in-the-middle attacks, banking Trojans and even ransomware-type attacks that irreversibly encrypt machines (but skip the ransom), experts say.

To read this article in full or to leave a comment, please click here

Network World Tim Greene