About Admin2

Microsoft’s latest patches address new USB hack

by Dara Kerr A new kind of vulnerability popped up recently, one that lets hackers stick a USB thumb drive into a computer — even if it’s logged-off or locked — type out a bit of attack code and steal whatever data they want. In an effort to avoid this type of cyberattack, Microsoft issued […]

Share
Leave a comment Continue Reading →

The Antivirus Industry’s Dirty Little Secret

The Antivirus Industry’s Dirty Little Secret Feb. 14 (Bloomberg) — Bloomberg Businessweek’s Jordan Robertson discusses why the antivirus industry has so many customers in the face of its ineffectiveness. He speaks on Bloomberg Television’s “Market Makers.” (Source: Bloomberg)

Share
Leave a comment Continue Reading →

6 Types of Data Chinese Hackers Pilfer

Mandiant Highlights Broad Range of Info Stolen from Victims By Eric Chabrow, February 19, 2013. Follow Eric @GovInfoSecurity IT security provider Mandiant lists six categories of information that’s commonly pilfered from business and government computers by hackers from a Chinese military unit it dubs APT1. Mandiant’s findings appear in a comprehensive report issued Feb. 18 […]

Share
Leave a comment Continue Reading →

SCADA & Security of Critical Infrastructures

Pierluigi Paganini February 22, 2013 Introduction In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an event considered by principal security experts extremely likely. Probably the strongest jolt has been caused by events such as the […]

Share
Leave a comment Continue Reading →

Cyber-security risks in energy sector highlighted

from Gulf-Times The Supreme Council of Information and Communication Technology (ictQATAR), through its Qatar Computer Emergency Response Team (Q-CERT), organised Secure Energy 2013, a conference that highlighted the latest information security trends, challenges and risks to help organisations in the country better manage information security in the critical energy sector, in addition to Q-CERT’s relevant […]

Share
Leave a comment Continue Reading →

RSA Conference 2013: Focus on Cyber Security

by Susan Nunziata The RSA Conference 2013 kicks off this week in San Francisco. It has an entire agenda track devoted to government IT security issues, and its speaker roster is chock-full of government officials hailing from the White House, the FBI, other federal agencies, as well as state and local government. This is only […]

Share
Leave a comment Continue Reading →

U.S. Army: USB Devices Are Security Risks

by Neal Ungerleider According to U.S. Army forces in South Korea, their top cybersecurity headache comes from troops and military employees charging their phones by hooking up USB cables to their computers. During a recent week-long period, the Korea Theater Network Operations Center logged more than 125 users recharging their smartphones through their computers. Because […]

Share
Leave a comment Continue Reading →

Android malware uses your PC’s own mic to record you

Two apps discovered on Google Play by Kaspersky were set up to record their victims by tapping into the Windows microphone software. by Lance Whitney (CNET) February 4, 2013 6:46 AM PST A couple of Android apps masquerading as cleanup tools actually had a sneakier mission in mind. Uncovered last month by Kaspersky, two apps […]

Share
Leave a comment Continue Reading →

Android Malware with ability to install Backdoor on Computers

By: Victor Chebyshev Kaspersky Lab Expert Posted February 01, 12:31  GMT 0.1 Users of inexpensive Android smartphones typically look for ways to accelerate their devices, for example, by freeing up memory. Demand for software that makes smartphones work a little faster creates supply, some of which happens to be malicious. In addition to legitimate applications, […]

Share
Leave a comment Continue Reading →

It’s time to overhaul our anti-malware defenses

February 1, 2013 | By Paul Mah Hackers based in China have allegedly broken into the networks of the New York Times, and separately, the Wall Street Journal. In the case of the former, security experts hired to investigate the break-ins found clues that point to the attack being the work of a state-sponsored hit […]

Share
Leave a comment Continue Reading →
Twitter widget by Rimon Habib - BuddyPress Expert Developer