Malware


What Have We Learned: Flame Malware

When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began trying to figure out what the significance of the tool was and whether it represented anything new. That was difficult at the time, given the lack of data on its exact capabilities and parentage. But, with the information available to us now, it seems safe to say that Flame has changed the way that many people think about the threat landscape and the way attackers work, not just in the security community but in the political arena, as well.

Video: One Minute Of Global Botnet Traffic

We write often about attacks linked to massive botnets like Cutwail, Sality and others. But what   does botnet activity really look like, were  you to visualize it? Security firm Unveillance has put together this short (five minute) video to help explain.


Chris Soghoian has made a name for himself as a security and privacy researcher and has been the bane of government agencies and organizations prone to being somewhat less than upfront about their security and privacy practices. In this video from the Personal Democracy Forum in New York this week, Soghoian discusses the implications of the U.S. government’s raid on Osama Bin Laden and usage of offensive cyberwar weapons such as Stuxnet and Duqu.

U.S. Attorney General Eric Holder has issued an assignment to the U.S. District Attorneys to start an investigation into possible leaks of classified information, presumably by individuals within the Obama administration who recently spoke anonymously about the administration’s ties to the development of Stuxnet.

Claims surfaced earlier this week that the French security firm VUPEN, which is known for selling zero-day vulnerabilities to third parties, had been compromised and more than 100 of the company’s secret bugs had been leaked. However, VUPEN’s CEO said that the claims were totally false and there was no hack, let alone a leak of the company’s vulnerability inventory.