Robert Lemos

Author: Robert Lemos

eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved
Robert Lemos covers cyber security for TechWeekEurope and eWeek
Robert Lemos's posts
Malware - Fotolia: skull button © alekup #34457353
On by Robert Lemos 0

A group of cyber-criminals, possibly from the Ukraine, has used the malware to steal payment card data from dozens of shops, according to RSA

Read more

Target
On by Robert Lemos 0

Security researchers reveal details of the malware used in the damaging breach of US retailer Target

Read more

surveillance spy security NS GCHQ © Andrea Danti Shutterstock
On by Robert Lemos 0

Software that pulls card numbers from computer memories is a growing threat, and may have been used in two recent heists, according to experts

Read more

CryptoLocker
On by Robert Lemos 0

A newly discovered variant of the file-encrypting Cryptolocker ransomware automatically propagates via USB storage, according to researchers

Read more

NSA-Logo
On by Robert Lemos 0

The NSA reportedly monitors data from application crashes in order to pinpoint vulnerabilities

Read more

Internet of things fibre cable circuit board network © asharkyu Shutterstock
On by Robert Lemos 0

Attackers will increasingly target devices that make up the Internet of things during 2014, experts warn

Read more

CryptoLocker
On by Robert Lemos 0

Dell Secureworks has estimated that the Cryptolocker botnet infected at least 200,000 systems in its first 100 days and is likely to have netted its creators millions in ransom

Read more

botnets
On by Robert Lemos 0

The cyber-crime group behind the ZeroAccess botnet appears to have given up on resuming control of its 1.3 million compromised PCs, following law enforcement action

Read more

follow-the-money
On by Robert Lemos 0

A new study suggests that all software companies should buy critical code flaws to close cyber-crime vulnerabilities

Read more

Finance IT, Canary Wharf © Luciano Mortula Shutterstock 2012
On by Robert Lemos 0

A group of financial organisations has highlighted the IT security risks that come with the use of third-party suppliers

Read more