by Dara Kerr A new kind of vulnerability popped up recently, one that lets hackers stick a USB thumb drive into a computer — even if it’s logged-off or locked — type out a bit of attack code and steal whatever data they want. In an effort to avoid this type of cyberattack, Microsoft issued […]
The Antivirus Industry’s Dirty Little Secret
The Antivirus Industry’s Dirty Little Secret Feb. 14 (Bloomberg) — Bloomberg Businessweek’s Jordan Robertson discusses why the antivirus industry has so many customers in the face of its ineffectiveness. He speaks on Bloomberg Television’s “Market Makers.” (Source: Bloomberg)
6 Types of Data Chinese Hackers Pilfer
Mandiant Highlights Broad Range of Info Stolen from Victims By Eric Chabrow, February 19, 2013. Follow Eric @GovInfoSecurity IT security provider Mandiant lists six categories of information that’s commonly pilfered from business and government computers by hackers from a Chinese military unit it dubs APT1. Mandiant’s findings appear in a comprehensive report issued Feb. 18 […]
SCADA & Security of Critical Infrastructures
Pierluigi Paganini February 22, 2013 Introduction In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an event considered by principal security experts extremely likely. Probably the strongest jolt has been caused by events such as the […]
Cyber-security risks in energy sector highlighted
from Gulf-Times The Supreme Council of Information and Communication Technology (ictQATAR), through its Qatar Computer Emergency Response Team (Q-CERT), organised Secure Energy 2013, a conference that highlighted the latest information security trends, challenges and risks to help organisations in the country better manage information security in the critical energy sector, in addition to Q-CERT’s relevant […]
RSA Conference 2013: Focus on Cyber Security
by Susan Nunziata The RSA Conference 2013 kicks off this week in San Francisco. It has an entire agenda track devoted to government IT security issues, and its speaker roster is chock-full of government officials hailing from the White House, the FBI, other federal agencies, as well as state and local government. This is only […]
U.S. Army: USB Devices Are Security Risks
by Neal Ungerleider According to U.S. Army forces in South Korea, their top cybersecurity headache comes from troops and military employees charging their phones by hooking up USB cables to their computers. During a recent week-long period, the Korea Theater Network Operations Center logged more than 125 users recharging their smartphones through their computers. Because […]
Android malware uses your PC’s own mic to record you
Two apps discovered on Google Play by Kaspersky were set up to record their victims by tapping into the Windows microphone software. by Lance Whitney (CNET) February 4, 2013 6:46 AM PST A couple of Android apps masquerading as cleanup tools actually had a sneakier mission in mind. Uncovered last month by Kaspersky, two apps […]
Android Malware with ability to install Backdoor on Computers
By: Victor Chebyshev Kaspersky Lab Expert Posted February 01, 12:31 GMT 0.1 Users of inexpensive Android smartphones typically look for ways to accelerate their devices, for example, by freeing up memory. Demand for software that makes smartphones work a little faster creates supply, some of which happens to be malicious. In addition to legitimate applications, […]
It’s time to overhaul our anti-malware defenses
February 1, 2013 | By Paul Mah Hackers based in China have allegedly broken into the networks of the New York Times, and separately, the Wall Street Journal. In the case of the former, security experts hired to investigate the break-ins found clues that point to the attack being the work of a state-sponsored hit […]