Icefog Cybercriminals Use Java Backdoor to Target US Organizations
Back in September 2013, researchers from Kaspersky published a report on Icefog, a cybercriminal campaign that mainly targeted organizations in Japan and South Korea. After further analyzing the...
View ArticleIndustry Acquisitions Show Enterprise Appetite for Malware Analysis,...
FireEye’s acquisition of Mandiant and last month’s acquisition of Norman Shark by Blue Coat Systems reflect the growing awareness among enterprises that they need sophisticated security technologies...
View ArticleGoogle Chrome 32.0.1700.77 Security Fixes
Google pushed a new stable version of the Chrome browser (32.0.1700.77) for Windows, Mac, and Linux on Tuesday and improved its security with a total investment of $8,000 / €5,875 in external...
View ArticleUK Government Reportedly Bans Videoconferencing Devices from Huawei
The British Home Office, Ministry of Justice, the Crown Prosecution Service and other government departments have allegedly stopped using videoconferencing equipment from Huawei due to concerns that...
View ArticleChina’s Huawei Denies US Spies Compromised its Equipment
BEIJING – Chinese tech giant Huawei, which has long been dogged by security suspicions abroad, on Wednesday denied a report its telecommunications network equipment had been compromised by US spies....
View ArticleNSA Taps Offline Computers Using Radio Waves: Report
NSA Taps Offline Computers with Secret Bug: Report WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when...
View ArticleCybercriminals Abuse Mobile Applications to Launch DDOS Attacks
Distributed denial-of-service (DDOS) attack protection solutions provider Prolexic has published its Global DDOS Attack Report for the fourth quarter of 2013. The company says that cybercriminals are...
View ArticleTech Q&A: How thieves steal data but don’t take it
QUESTION: My computer was “nailed” by the CryptoLocker malware. It has encrypted my Microsoft Word documents and Excel spreadsheets so that I can’t access them.
View ArticleHealthcare.gov Could Suffer an Insider Breach, Experts Predict
SpectorSoft, a company that specializes in user activity monitoring and analysis software, has published its predictions for 2014. The predictions are interesting because theyre from the perspective of...
View ArticleUS-CERT Warns of NTP Amplification Attacks
US-CERT is warning organizations about a form of distributed denial-of-service attacks that seek to overwhelm victims with UDP traffic via publically-accessible NTP servers. NTP stands for Network Time...
View ArticleMobile-based DDoS Attacks Create Mitigation Challenges: Report
According to a new report from Prolexic Technologies, a provider of Distributed Denial of Service (DDoS) protection services that was recently acquired by Akamai Technologies, mobile applications are...
View ArticleAmazon, Google and GoDaddy Cloud Services Increasingly Abused by Cybercriminals
Managed security services provider Solutionary has published its SERT Quarterly Threat Intelligence Report for Q4 2013. The report focuses on malware analysis, malware distribution and the...
View ArticleClass Action Filed Against Neiman Marcus Following Data Breach
A class action has been filed against Neiman Marcus, the high-end retailer that suffered a data breach in which customer payment card information has been compromised. SC Magazine reports that the...
View ArticleQuantum physics could make secure, single-use computer memories possible
Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology .
View Article16 Saudi Arabian Government Websites Hacked by Syrian Electronic Army
Hackers of the Syrian Electronic Army have breached and defaced a total of 16 Saudi Arabian government websites. The targeted sites are the ones of various administrative regions, also known as...
View ArticleAVG Confirms One of Its Webservers Was Hacked and Defaced
AVG has confirmed that one of its webservers was recently breached by hackers. The IT security company is investigating the incident. HackRead reported that the famous Indonesian hacker Hmei7 targeted...
View ArticleInfosec Salaries Among Highest in IT
While two reports find that infosec pay is among the best in IT, infosec pros also face some of the greatest on-the-job challenges.
View ArticleInternet Infrastructure Attacks Yield High Returns for Cybercriminals: Cisco
Cisco paints a grim picture for 2014 in its annual security report, predicting “unprecedented growth” for advanced malicious attacks. The barrage of non-stop attacks is also taking a toll on the...
View ArticleWebsite of Turkey’s Central Bank Disrupted by RedHack
Shortly after leaking the phone numbers of over 4,000 Turkcell employees, hackers of the RedHack group have announced a new attack. Theyve disrupted the official website of the Central Bank of Turkey...
View ArticleJuniper Networks Launches New Virtualized Security Solutions
Juniper Networks has unveiled a new virtualized security platform designed to protect private and public cloud deployments. Called the Firefly Suite, the solution allows customers to attach, create and...
View Article