Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
CyberSource Peak Season Fraud Management Guide
Chinese Banks Warned About Bitcoins
December 06, 2013
China's central bank said Thursday that the nation's banks and payment systems were prohibited from handling Bitcoins. Bitcoins are "virtual goods" and have no legal weight, the banking body said. Individuals can still toy with them at their own risk, but financial institutions and payment systems can't touch -- no selling, no trading and no storing of Bitcoins.
Stolen Password Analysis Exposes Foolish Choices
December 06, 2013
Cybercriminals recently stole more than 2 million usernames and passwords from several popular sites including Facebook and Google. Pony, a botnet that logs user keystrokes, captured the information from more than 90,000 websites during the past month and then sent it to a hacker-controlled server. It snagged data from 326,000 Facebook accounts, 60,000 Google accounts and 22,000 Twitter accounts.
NSA's Malware Infection Spree Leaves Network Managers Powerless
November 26, 2013
The United States National Security Agency reportedly has seeded 50,000 networks worldwide with malware designed to steal sensitive information. The report -- the latest in a series of published disclosures based on documents released by Snowden -- is likely to fuel the controversy raging around cybersurveillance by the U.S. and its allies -- the UK, Australia, New Zealand and Canada.
Brit Spies Spoof LinkedIn Pages to Track Targets
November 11, 2013
British intelligence agency GCHQ reportedly has spoofed LinkedIn profiles of employees at mobile communications companies and mobile billing firms to gain access to their corporate networks. The first known attack was on Belgacom, a telecom firm partly owned by the Belgian government, according to a top secret GCHQ presentation revealed by NSA whistleblower Edward Snowden.
Insecurity and the Internet of Things, Part 2: Dangers Lurk
November 06, 2013
In early September, the U.S. Federal Trade Commission's first action involving security and the Internet of Things came to fruition. The FTC came to a settlement with Trendnet, which makes Internet-connected video cameras, over the firm's lax security practices. The settlement was over intrusions that occurred in January 2012, when hackers posted live feeds from about 700 Trendnet cameras online.
IE Gets Top Props for Thwarting Socially Engineered Malware
November 04, 2013
By duping an Internet innocent into making just one errant click, an online bandit can inflict a world of hurt. Socially engineered malware attacks attempt to deceive a user into downloading malicious software, typically through a link to an infected website. The best protections against those attacks are built into Microsoft's Internet Explorer, according to NSS Labs.
Cyberambush on Tunnel Security Blocks Main Israeli Artery
October 28, 2013
Israel last month was hit with a major cyberattack that shut down a key tunnel that forms part of its national road security network. The attack, only being reported now, knocked out key security operations on back-to-back days, resulting in hundreds of thousands of dollars in damage. It reportedly came in the form of a Trojan horse and caused shutdowns on both days.
Microsoft Pays First-Ever $100K Bounty for Windows Bug
October 09, 2013
Microsoft on Tuesday forked out what might be the biggest payment to a bug hunter yet: $100,000. The money went to James Forshaw, head of vulnerability research at Context Information Security, for coming up with a new exploitation technique that affects Windows 8.1 Preview. Microsoft did not disclose details of the mitigation bypass technique Forshaw discovered, and won't do so until it is addressed.
Symantec Paws at ZeroAccess Botnet
October 01, 2013
Symantec has removed more than 500,000 infected PCs from the botnet created by the ZeroAccess Trojan, which uses a peer-to-peer mechanism -- the latest technique botnet authors have adopted to avoid having their networks taken down by security experts. Symantec used a DNS sinkhole to fight the ZeroAccess botnet. The attack "made a sizeable dent," said Symantec security researcher Vikram Thakur.
Reengineering Human Behavior Can Foil Phishing
September 30, 2013
Almost all cyberattacks these days require an element of social engineering. Spammers are always looking for that hot button to induce a click on a link or an attachment. Drive-by artists continually experiment with poisoned banner ads designed to steer the curious into an online dark alley. Spearphishers put together persuasive pitches pretending to be friends or a trusted institution.
Heavy Attacks Expected as Microsoft Scrambles to Fix IE Flaw
September 18, 2013
Microsoft revealed Tuesday it was investigating a previously unknown security flaw affecting all versions of its IE Web browser. Hackers have attempted to exploit the vulnerability in targeted attacks on users of versions 8 and 9, it reported in a security advisory. "The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code," the advisory says.
Web App Firewalls Blunt Attacks
September 16, 2013
Web applications have become attractive targets for hackers because they allow bad actors to maximize the reach of their mischief with a minimum of effort. That's what originally attracted the Internet underworld to programs like Windows and Adobe Acrobat, and it's what continues to attract them to Java. A vulnerability in one of those programs can be exploited in millions of machines.
Needle in a Haystack: Harnessing Big Data for Security
September 14, 2013
The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible. Until now, security has been based largely on the opinions of researchers who investigate attacks.
No End to the Headaches Endpoints Give System Defenders
September 03, 2013
If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.
UK Detains Partner of Leak-Publishing Journalist
August 19, 2013
The partner of Glenn Greenwald, the journalist with The Guardian who has published a slew of articles detailing National Security Agency surveillance programs, was detained for nearly nine hours Sunday at London's Heathrow Airport. Greenwald's partner, David Miranda, was en route from Berlin to his home in Rio de Janeiro when he was stopped by officers at just after 8:00 a.m.
Who's Afraid of Linux Malware?
August 19, 2013
There once was a time when Windows users could feel relatively safe and secure as they made their online excursions around the World Wide Web. Those days ended relatively quickly, of course, followed soon afterwards by a similar waning of confidence on the Mac side. For those of us who prefer Linux, however, the Age of Innocence -- as one might call it -- has lasted much longer.
Major US Media Succumb to Unsophisticated Syrian Hack Attacks
August 16, 2013
The Syrian Electronic Army on Thursday claimed credit for hack attacks that took control of portions of a handful of major U.S. news sites via an article-recommendation service they all use. SEA reportedly gained control of them by entering an administration portal for Outbrain and inserting links in some of the recommended articles at the bottom of the Web page, thereby redirecting readers to its own site.
FBI Attack on Child Porn Sites May Have Blown Tor Users' Cover
August 05, 2013
Ireland-based Freedom Hosting, which hosted several servers on the Tor Project's hidden network, has been taken down through a vulnerability in the Firefox browser -- and the FBI is widely suspected of being the attacker. The FBI reportedly is seeking to extradite Freedom Hosting's owner, Eric Eoin Marques, to the United States to face charges of running a huge child porn network.
5 Ways to Improve Your Privacy Online
July 30, 2013
It wasn't long after the Internet came into widespread use that online privacy became a growing concern. After all, anytime people are connected through their computers and sharing resources online, there's the potential for prying and abuse. Such concerns were compounded with the arrival of social networks, online banking and, of course, malware -- among other points of potential weakness.
Huawei Gets Anti-Porn Tech Right, UK Says
July 26, 2013
Britain is simultaneously investigating and praising Chinese telecommunication firm Huawei. OK, so the UK didn't out and compliment Huawei. Less than a week after British authorities launched a cybersecurity review of the company, however, Prime Minister David Cameron said that British telecommunications company TalkTalk had shown "great leadership" in implementing its online pornography filter.
Beijing's 'Water Army' Swamps Social Media
July 25, 2013
Long known for its out-and-out censorship, Beijing now appears to be filling Chinese social media with pro-government messages. The new tack was on full display after the Thursday indictment of fallen Communist Party member Bo Xilai, who was busted for corruption and abuse of power in 2012. While China's social media censors were surely working overtime, so too were its copywriters.
Google Play Misses Dangerous Apps at Border Control
July 23, 2013
Despite yeoman efforts by Google to close a critical hole in its Android mobile operating system that allows any app to be turned into a malicious Trojan, programs are still appearing in the company's Google Play store with the flaw. A number of apps containing the so-called MasterKey vulnerability were discovered by cybersecurity firm Bitdefender last week.
Google Sticks a Thumb in Android Security Dike
July 09, 2013
Lumbering like the old-school technology firms it sometimes derides, Google has finally issued a patch for a master key vulnerability in Android that Bluebox called to its attention back in February. "Is Google eating their own dog food?" asked Randy Abrams, a research director at NSS Labs. The vulnerability lets attackers modify Android apps into Trojan apps without breaking their APK signature.
Microsoft Woos Hackers with Bounties for Bugs
June 21, 2013
Following in the footsteps of rivals including Google and Mozilla, Microsoft this week hung a figurative "Wanted" sign in its Security Response Center offering rewards up to $100,000 for those who find vulnerabilities in its software. Specifically, the software giant announced three "Bug Bounty" programs in an effort to find and fix vulnerabilities in its software.

See More Articles in Malware Section >>
Facebook Twitter LinkedIn Google+ RSS