Unmanned aerial vehicle with the ability to run cyber attacks on computers and mobile devices through Wi-Fi networks.
The experts at Kaspersky Lab confirmed that threat actors behind Duqu 2.0 was detected in an attempt of intrusion against its internal network. The discovery of the intrusion was casual, Kaspersky discovered Duqu 2.0 while testing a new technology designed to detect advanced persistent threats.
Security researcher Seth Wahle of APA Wireless and Rod Soto of Hack Miami used a near-field communications (NFC) chip implant in his hand to demonstrate that it is possible to exploit Android devices and avoid detection by common body scanners located at airports and high-security environments.
Cutely named malware packages connected to the Animal Farm group.