“Chinese” Hackers Hit Firms Behind Israel’s Iron Dome
According to Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. , between Oct. 10, 2011 and August 13, 2012, attackers thought to be operating out of China hacked into the...
View ArticleVideo games industry is fighting an advanced cyber attack campaign
THE VIDEO GAMES INDUSTRY is at the mercy of a large scale advanced cyber attack campaign designed to steal source code, Dell’s security arm Secureworks has revealed .
View ArticleCountry-Specific Web Domains Can’t Be Seized: ICANN
Country Web Domains Can’t be Seized: Regulator WASHINGTON – The Internet’s regulatory authority said Wednesday that country-specific Web domains cannot be seized in court proceedings, as it sought to...
View ArticleTor warns users it was attacked, but details on deanonymizing efforts sketchy
Whil the company said users of Tor should “assume they were affected,” the developers of the anonymous browsing service doesn’t yet know what “affected” means.
View ArticleFacebook for Android Receives Security Fixes
A number of three vulnerabilities have been eliminated from the Facebook app for Android devices; these would allow a potential attacker to conduct denial-of service (DoS) type of attacks on the...
View ArticlePushdo Botnet Continues to Stay Strong
Pushdo botnet continues to stay strong as security company’s systems record almost 200,000 unique IP addresses attempting to communicate with the domains of the command and control servers.Bitdefender...
View ArticleInternet of Things Multiplies Attack Vectors, HP Finds
A report from HP Security Research, created as after of analyzing popular devices in the most common Internet of Things (IoT) areas, shows that the number of vulnerabilities for each of the items...
View ArticleTor hints at possible U.S. government involvement in recent attack
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today...
View ArticleFacebook Phishing Scam Asks for More Than Social Network Credentials
A phishing scam posing as a Facebook notification, has been spotted in the wild trying to steal log in credentials not just for the account of the social networking site, but also for the email account...
View ArticleNOAA Cybersecurity Criticized in Audit by Inspector General
A cybersecurity audit of the National Oceanic and Atmospheric Administration uncovered an agency challenged by inconsistent security controls.
View ArticleHackers have compromised the once anonymous Tor network
The Tor anonymous encryption service offers internet users a way to surf the web with anonymity and prides itself on the level of security it offers.
View ArticleUSB Device Firmware Can Be Reprogrammed to Hide Sophisticated Malware
Researchers Develop “BadUSB” to Demonstrate Extreme Threats Posed by USB Devices Users have long been warned about the dangers of using USB drives, but new research shows significant threats that stem...
View Article“Pitty Tiger” Threat Actors Possibly Active Since 2008: FireEye
Researchers at FireEye have analyzed the operations of the advanced persistent threat (APT) group dubbed “Pitty Tiger,” and determined that it might have been active since as far back as 2008.
View ArticleWhen Will U.S. Cyber Alarms Match its Cyber Threats?
Former Secretary of State Madeline Albright recently stated that “the world is a mess.” And indeed it is. From Russia’s stoking of a war of insurrection in the Ukraine to the Israel-Hamas war to...
View ArticleFiesta Exploit Kit Delivers Double Payload
In an attempt to evade detection, threat actors have modified the way Fiesta Exploit Kit (EK) delivers the payload to the target computer by sending two malicious files.This sort of technique is not...
View ArticleSymantec Publishes Advisory for Mitigating Zero-Day Risks
In the wake of the zero-day threats in Symantec Endpoint Protection (SEP) suite presented by the Offensive Security team this week, Symantec has released an advisory for avoiding the risks of...
View ArticleChinese Hackers Hit Canada’s National Research Council
The NRC says it’ll take a year to develop a new secure IT infrastructure.
View ArticleNATO Unprepared for Russian Attack: UK Lawmakers
“Events in Ukraine this year, following on from the cyber attack on Estonia in 2007 and the invasion of Georgia by Russia in 2008, are a ‘wake-up call’ for NATO.”
View ArticleTwitter Acquires Password Management Startup Mitro
The security startup behind the Mitro password manager has been acquired by Twitter, the team at Mitro announced on Thursday. The financial terms of the deal were not disclosed.
View ArticleToday’s cars are hackable, posing a threat to you
A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most “hackable” of 20 car models reviewed by automotive security...
View Article