March 2016

The recent media revelations of the Pakistan Army snooping on Indian army personnel’s phones and computers, reportedly through a malware called SmeshApp, is the latest instance of the challenges faced by the Indian military in guarding sensitive and classified information such as the deployment and movement of troops and details of counter-terrorism operations like the […]

by

An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications. The latest example is a China-based hacker group that has launched targeted attacks against government and commercial organizations from around the world over the past two years. The group’s activities were uncovered by researchers […]

by