The Cyber fighters of Izz Ad-Din Al Qassam hacker group - also known as Qassam Cyber Fighters - are at it again. For the third time in the last half year or so, they have mounted DDoS attacks agai...
View the Original article
Friday, April 5, 2013
US companies in China worried about data theft
The results of a survey conducted by the American Chamber of Commerce in China which polled 325 respondents currently doing business throughout the republic has shown that a quarter of them have exper...
View the Original article
View the Original article
Dataguise enhances DG for Hadoop with selective encryption
Dataguise announced DG for Hadoop 4.3, which provides both masking and selective encryption for sensitive data in major Hadoop distributions. The new version also delivers expanded capabilities, inclu...
View the Original article
View the Original article
Route1 releases MobiKEY for iPad
Route1 released MobiKEY technology for the iPad. MobiKEY is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity management in a mobile computin...
View the Original article
View the Original article
Firefox enhances private browsing
Mozilla released Firefox 20 that fixes several security and stability issues. Included in the update are eleven critical security updates. Firefox includes a new enhancement to private browsing t...
View the Original article
View the Original article
Aggressive Android adware and malware on the rise
With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is increasingly taking a ba...
View the Original article
View the Original article
Defending the Internet at scale
A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing OS kernels and moving from...
View the Original article
View the Original article
Fake "PayPal account deleted" emails doing rounds
A new email spam campaign targeting PayPal users is under way. The email subject line says the email contains an unread message from PayPal, but the email address from which it is supposedly sent i...
View the Original article
View the Original article
The security risks of using Wi-Fi on the Tube
The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who want to maintain internet a...
View the Original article
View the Original article
The War Z taken offline following forum, database hack
Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer's (Hammerpoint Interactive) forum and game databases and the theft of user data contained in ...
View the Original article
View the Original article
Blocking zero-day application exploits: A new approach for APT prevention
Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. The recently discovered advanced persistent threat (APT) malware, Trojan.
View the Original article
View the Original article
Banking Trojan disguised as innocuous Word and WinHelp files
Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other security software. These techniq...
View the Original article
View the Original article
Thousands of compromised Apache servers direct users to malware
What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, all these sites are h...
View the Original article
View the Original article
F-Secure rebuilds free Online Scanner
F-Secure�s free Online Scanner tool has been completely rebuilt to be faster, lighter and more powerful than before, and now even cleans up advanced rootkits, the most difficult-to-remove malware. ...
View the Original article
View the Original article
Tips for avoiding tax scams
As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings show that identity theft ...
View the Original article
View the Original article
DIY: Using trust to secure embedded projects
This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel's CryptoModule (AT97SC3204T) and CryptoAuthe...
View the Original article
View the Original article
Security professionals don't have secure mobile habits
Security professionals have embraced BYOD and they�re taking �anytime, anywhere� access to some pretty interesting locations according a new survey by Ping Identity. Most also admit to employing poor ...
View the Original article
View the Original article
Ciphertex releases 24TB portable, secure NAS server
The new 24TB portable, highly secure NAS server from Ciphertex is meant for backup, disaster recovery and business continuity, file sharing and virtualization. �The Ciphertex CX-6K-AV is a compac...
View the Original article
View the Original article
Malware attacks occur every three minutes
Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy defenses up to once every three...
View the Original article
View the Original article
My very own personal privacy training
I remember a time - and it wasn't even that long ago - when the government, companies and organizations weren't this hell-bent on collecting citizen, customer and user data. It's not that they didn't ...
View the Original article
View the Original article
Wide variety of malware lurking in Skype messages
A new malware-spreading campaign is targeting Skype users, warns Dancho Danchev. The attack is mounted via malware-infected users whose compromised Skype account is set to send out messages to thei...
View the Original article
View the Original article
Review: Lookout for iPhone
One of the recent issues of Forbes magazine featured a three-page story on Lookout Inc., the company that, according to the article, has been able to trounce multibillion-dollar security giants like M...
View the Original article
View the Original article
Flashback malware author unmasked?
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their permission to be downloaded, which resulted in a 600K strong ...
View the Original article
View the Original article
Carberp Trojan developers arrested in Ukraine
The mastermind behind the Carberp Trojan and the developers that helped created it have apparently been arrested in Ukraine in a joint action by the Security Service of Ukraine (SBU) and the Russian F...
View the Original article
View the Original article
Two Japanese web portals hacked, user financial info compromised
Personal and financial information belonging to users of two big Japanese web portals has been compromised earlier these week, Computerworld reports. On Tuesday evening, Yahoo Japan (owned by Sof...
View the Original article
View the Original article
Destroy solid state storage and optical media
Data Security unveiled their SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller. NSA has evaluated the SSMD-2mm Destruction Device and fo...
View the Original article
View the Original article
Tips for securely using free Tube Wi-Fi
GFI Software warned of potential data and device security concerns posed by using London�s public Wi-Fi service, installed across large parts of the London Underground Tube network. Here are key ...
View the Original article
View the Original article
Microsoft to release 9 advisories on Tuesday
April 2013 advance notice is out and it forecasts an interesting patching session for Microsoft administrators. There are 9 advisories affecting 16 distinct platforms in 5 categories of Microsoft pro...
View the Original article
View the Original article
10 best practices for securing data in Hadoop
Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals c...
View the Original article
View the Original article
iMessage encryption stumps US federal agents
A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via Apple's iMessage system. ...
View the Original article
View the Original article
Subscribe to:
Posts (Atom)