Robert Lemos

About

Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

NSA Helped Create Stuxnet Cyber-Weapon, Snowden Claims

The National Security Agency collaborated with the Israeli government to create the program used in a cyber-attack that disrupted Iran’s uranium processing capability and delayed its nuclear ambitions, former intelligence consultant and whistleblower Edward Snowden said in an interview published in the German magazine Der Spiegel. Allegedly conducted prior to Snowden’s release of classified intelligence […]

Cloudsweeper Project Estimates Your Inbox’s Worth to Criminals

People who have ever wondered why online criminals would want to gain access to their email accounts now have a way to find out: Two researchers at the University of Illinois at Chicago have created an online service that checks a person’s Gmail account for sensitive information, offers to encrypt the information and then estimates […]

Cyber-Attackers Constantly Hitting Gas Utilities in 2013

Unknown attackers have targeted the Internet-connected systems of natural-gas companies, using brute-force attacks to attempt to access the companies’ business and process-control networks, according to a report published last week by the Internet Control System Cyber Emergency Response Team (ICS-CERT). The incidents, which occurred in January and February, were first reported to the ICS-CERT, a […]

Lookout Aims to Rein In Mobile Advertisers’ Bad Behavior

Many mobile-application developers rely on advertising to offer their apps for free yet still turn a profit. However, a lack of rules on what constitutes good behavior in advertising on mobile devices has allowed many advertising platforms to adopt aggressive practices. On June 26, mobile-device management firm Lookout announced it would warn users of installed […]

South Korean Universities Targeted by PinkStats Malware

A Chinese attack tool, dubbed PinkStats, is being actively used to infect South Korean university networks and install denial-of-service attack tools, security firm Seculert stated in a June 25 analysis of the malware. PinkStats has infected at least 1,000 computer systems, mostly in educational institutions within the country, using a technique known as Address Resolution […]

Android Devices Become New Target of Ransomware Scams

Criminals have begun targeting smartphones with software that locks up the devices until the victims pay a ransom to get the unlock code, security firm Symantec stated in a brief analysis of the malware. Known as ransomware, the scam has typically targeted personal computers, where it has become a profitable way for cyber-criminals to fleece […]

CrowdStrike Launches Security Service That Tracks Cyber-Attacker Tactics

For nearly a year, startup security firm CrowdStrike has talked up the concept of active defenses: technologies and tactics that identify the attackers and their targets so companies can use the information to protect their data systems. The company announced a managed service designed to allow companies to track attackers not by their malware or […]

Microsoft Liberates More Than 1.2 Million PCs From Citadel Botnet

A team of industry and law-enforcement partners—including Microsoft, the Federal Bureau of Investigation and financial firms—have successfully disrupted a collection of botnets running on the Citadel Trojan, freeing more than 1.2 million computers from the control of cyber-criminals, Microsoft’s Digital Crimes Unit said this week. On June 6, Microsoft announced that it had executed its […]

Microsoft Joins Bug-Bounty Movement After a Long Delay

Breaking a longstanding moratorium on paying for information on vulnerabilities in its software products, Microsoft announced June 19 that the company has created two programs that will pay researchers for information on software flaws and a third that will reward researchers who create defensive measures. The software company will pay $100,000 to any researcher who […]

Banking Trojan Steals Funds, Then Attempts to Hire Victims as ‘Mules’

A group of criminals using the popular Zeus banking Trojan have started advertising for accomplices, displaying ads for job scams whenever the victim visits a popular job site, financial security firm Trusteer said on June 13. Typically, victims whose computers are infected with Zeus have to worry about their bank accounts being drained. Yet if […]