RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20162016
Collapse AugustAugust
NPPD still hopeful on infrastructure protection
Big data, Google and the end of free will
Deutsche Bank’s $10-Billion Scandal
The biggest threat facing connected autonomous vehicles is cybersecurity
Random hackers are taking NSA-linked cyber weapons for a test drive
Many hospitals transmit your health records unencrypted
Hints suggest an insider helped the NSA “Equation Group” hacking tools leak
'Imminent' terror attack on Britain stopped 'at the 11th hour'
NSA leak rattles cybersecurity industry
JPMorgan settles WaMu case against FDIC
Homeland Security Offering States Voting Cybersecurity Help
China Says Foreign Investors' Concern Over Its Cybersecurity Bill Is 'Unnecessary'
‘Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked?
Trapwire surveillance system exposed in document leak
To curb radicalism, France targets foreign funding for mosques
Fractured Lands: How the Arab World Came Apart
Where in the world is my data and how secure is it?
Can the Centre Hold?
Delta Air Lines CEO Takes Responsibility for Outage
Political Cybersecurity Is Not a Partisan Issue
Security Screeners Cut Corners at Rio Games
Think Tank Scholar or Corporate Consultant? It Depends on the Day
Risks as Distractions
Researchers or Corporate Allies? Think Tanks Blur the Line
Apple Launches Bug Bounty with Maximum $200,000 Reward
Cyber-Protecting Critical Infrastructure Different than Protecting Data
How a Secretive Branch of ISIS Built a Global Network of Killers
Yahoo investigating claimed breach and data dump of 200 million users
How to attract a board-level cybersecurity expert
How vulnerable are our electronic voting systems to cyber attack?
Expand JulyJuly
Expand JuneJune
Expand MayMay
Expand AprilApril
Expand MarchMarch
Expand FebruaryFebruary

Risk News

5/31/2012
Researchers Find Clues in Malware

"Security experts have only begun examining the thousands of lines of code that make up Flame, an extensive, data-mining computer virus that has been designed to steal information from computers across the Middle East, but already digital clues point to its creators and capabilities."

Annie's take:

One hardly knows what to make of this careful story, that dances around the identification of the malware's creator.