Resource Library Information Security

Links to web sites outside the U.S. Federal Government or the use of trade, firm, or corporation names within the Overseas Security Advisory Council web site are for the convenience of the user. Such use does not constitute an official endorsement or aapproval by the Overseas Security Advisory Council of any private sector web site, product, or service.
Data pager
Records Per Page:
PageSizeComboBox
select
 
Data pager
Records Per Page:
PageSizeComboBox
select


AAEH is polymorphic downloader botnet also known as VObfus, VBObfus, Changeup or Beebone. The botnet infections are primarily in the U.S. (11,000) and UK (1,100). AAEH is likely…


This PSA is intended to provide information on complaints the FBI’s Internet Crime Complaint Center (IC3) has received regarding criminals hosting fraudulent government services…


Since September 2012, approximately 50 U.S. financial institutions have been targeted in over 350 separate DDoS attacks with varying effects. The botnets used in the attacks,…


As of early March 2015, several extremist hacking groups indicated they would participate in a forthcoming operation, #OpIsrael, which will target Israeli and Jewish Web sites.…


Cybercriminal underground economies are fueled by one thing—your stolen personal data. Each data type sells for a different price. This interactive infographic focuses on the…


FBI Cyber FLASH Alert #M-000048-TT: On 12 January 2015, the hacking group CyberCaliphate accessed the Twitter and YouTube accounts of U.S. Central Command (CENTCOM). Tweets were…


Since July 2014, financially-motivated cyber criminals have used targeted social engineering techniques on employees of telecommunication providers to obtain unauthorized access…


All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This paper seeks to raise awareness of the underexposed…


Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and…


Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Part I: Reducing Employee and Application…