Robert Lemos

About

Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

China’s Underground Cyber-Crime Economy Grows in Size, Sophistication

The tool is called Social Engineering Master. Anyone who pays the equivalent of $50 can search through a variety of stolen or leaked information and use it to create a convincing cyber-attack targeted at a specific victim or group of victims. The online service is just one of the offerings that have cropped up as […]

Securing Tech Product Supply Chain Is No Easy Task

Malware and spyware are worries for anyone browsing the less-traveled Internet or wondering whether they should open an attachment from an unknown sender. Yet occasionally, the unwanted programs attempt to hitch a ride on other devices. Florida-based network integrator iPower Technologies found one such device. The company, which is creating a video storage system for […]

Purported Stealthy POS Malware Threatens Retailers, Stirs Controversy

Attackers have targeted retailers with a sophisticated malware framework that infects point-of-sale systems and uses high-level encryption to hide its functionality and make analysis difficult, security-consultancy iSIGHT Partners said on Nov. 24. The malware framework, dubbed ModPOS, is very hard to detect and likely has infected multiple retailers, iSIGHT said. With its large code base […]

Chimera Ransomware Uses Peer-to-Peer for Decryption

A ransomware program known as Chimera has adopted a relatively unknown peer-to-peer messaging system to communicate with the criminals’ command-and-control server, making investigating the infrastructure more difficult, according to security researchers. The messaging system, known as BitMessage, is a communications system that allows messages to be encrypted, prevents spoofing and relieves the user of any […]

Blackhole Exploit Kit Makes a Comeback

The once-popular Blackhole exploit kit has returned, attempting to infect using old exploits but also showing signs of active development, according to researchers with security firm Malwarebytes. Over the weekend, Malwarebytes detected attacks using older exploits for Oracle’s Java and Adobe’s Acrobat, but which attempted to deliver recently compiled malware. When Malwarebytes investigated, it found, […]

Demand for Zero-Day Flaws Drives Bug Bounties to Exceed $1 Million

On Nov. 1, Zerodium announced that it had agreed to pay $1 million for code that exploited a collection of bugs in Apple’s iOS to fully compromise a device running the mobile operating system. With typical bug bounty awards ranging from thousands to tens of thousands of dollars—and only a smattering of past deals paying […]

Analysis Finds Flash Top Exploit Target as Adobe Fixes Latest Flaws

Software maker Adobe issued an update on Nov. 10 to fix 17 critical vulnerabilities in its ubiquitous Flash player, the day after an analysis found that the program was the most popular target of exploit-kit developers. The patch, released the same day as Microsoft’s regular Patch Tuesday, closes a variety of vulnerabilities found by researchers […]

Adware Programs Pose as Popular Apps, Root Android Devices

Over the last year, a trio of pernicious Android adware programs have been posing as popular apps and then been taking complete control of the devices on which they run, according to report from mobile security firm Lookout. The three adware programs—known as Shedun, Shuanet and ShiftyBug—are interconnected families whose developers appear to share code. […]

Almost Half of Firms Admit IT System Breach in Ponemon Survey

Nearly half of companies that responded to a Ponemon Institute survey have suffered a breach in the past two years that compromised their business network or data. While three-quarters of respondents to the survey believe threat intelligence is necessary to protect against such breaches, information sharing hasn’t helped as much as the companies expected, according […]

Demand for Cyber-Insurance Rises, but Insurers Worry

Over three weeks in 2013, cyber-criminals siphoned consumer data from Target, stealing more than 110 million records and causing at least $260 million in damages to the retail giant. A months-long breach at Home Depot, disclosed in September 2014, resulted in the leak of information on 56 million credit and debit cards and 53 million […]