![]()
Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.
|
MiniFlame Drops Cyberbombs on High-Value Targets October 17, 2012
Security researchers have identified a new offshoot of the notorious Flame espionage malware. The malware, called "miniFlame," creates a backdoor in the systems that it infects. That backdoor can then be used by an attacker to gain access an infected machine. The attacker can then write files to the compromised computer, snatch files from it or snap screenshots of its display.
|
Stopping the PhD Cybercriminal October 15, 2012
The concept of intelligent containment of risk is an important approach to overall IT security. In today's environment, rapid and proactive containment of problems and breaches -- in addition to just trying to keep the bad guys out of your systems -- makes sense. To find out what other approaches to data security are gaining traction, listen to today's podcast featuring Kaivan Rahbari, senior vice president of risk management at FIS Global.
|
|
Panetta Rattles Cybersword October 12, 2012
In a wide-ranging speech on cybersecurity, U.S. Secretary of Defense Leon Panetta on Thursday warned about a cyber Pearl Harbor, indicated the Department of Defense would respond in such a situation, called for greater public-private cooperation in cybersecurity, and talked about the need for a presidential executive order on cybersecurity.
|
Big Businesses Walloped With Climbing Cybercrime Costs October 08, 2012
Cybercrime costs continued to climb in 2012 according to a report released Monday by the
Ponemon Institute. The study of 56 large organizations showed that the average annualized cost of cybercrime for the businesses was $8.9 million a year compared to $8.4 million a year ago. Losses for the firms ranged from one $1.4 million to $46 million. Cyberattacks have become common occurrences, said the study.
|
|
FTC Slams Door on Tech Support Scammers October 03, 2012
The Federal Trade Commission has put a stop to a handful of tech-support scams based mainly in India that promised to remove viruses or other malware from users' computers. The scams primarily involved telemarketers contacting people in the United States and other English-speaking countries, falsely telling them that their computers were infected with malware and offering costly solutions to the nonexistent problems.
|
Apple Starts iPad Mini Production on the Sly October 03, 2012
Apple's Asian component suppliers reportedly have begun mass-producing parts for a new tablet, which is believed to be smaller, and with a lower resolution, than the latest iPad that went on sale last March. Last month, South Korean LG Display and Taiwanese AU Optronics reportedly began mass-producing LCD screens to be used on the new devices
|
|
Federal Grants Wed Public-Private Cybersecurity Efforts October 02, 2012
The debate in the U.S. Congress over a comprehensive national cybersecurity program is wearing on, largely because of differences over the roles of government and business in protecting information technology. Elsewhere, however, cybersecurity awareness and research projects are being launched through cooperative efforts.
|
Report: The Internet Is a Language Killer September 27, 2012
A number of European languages could eventually vanish from the Internet, suggests a new study conducted by European nonprofit META-NET. Languages such as Icelandic, Latvian and Lithuanian don't have enough speakers to gain traction as popular languages on the Web. The report goes so far as to say that German, Italian, Spanish and French could be at risk, too.
|
|
Cheat Fresh: Romanian Pair Cop to Subway Credit Card Hack September 20, 2012
Two Romanian men, ages 27 and 28, have pleaded guilty to a multimillion-dollar hacking scheme targeted at Subway restaurants. The two men, arrested last December, were part of what is believed to be a four-person group that stole information from an estimated 146,000 payment cards belonging to Subway customers.
|
Taliban Spies Posing as Facebook Hotties September 10, 2012
Taliban insurgents are using photos of "attractive women" on Facebook to gather intelligence from coalition soldiers, according to The Daily Telegraph's Australia page. The threat is such that Australian soldiers are being given pre-deployment briefings about Taliban using social media to dupe the opposition.
|
|
ID Theft Gives Apple Another Security Black Eye September 10, 2012
Once upon a time, security shiners involving Apple were as rare as Windows Vista lovers, but now it seems that a week doesn't go by without the name of Steve Jobs' baby being dragged through the digital mud. Last week's episode involved the hacktivist group AntiSec and the FBI.
|
Java Patch May Be Just a Finger in the Dam September 04, 2012
Oracle acted swiftly last week to close a zero-day vulnerability in its Java technology, but given Java's track record, that patch is just one hit in a long game of wackamole played with hackers. A number of security companies discovered the vulnerability over the weekend of Aug. 25.
|
|
How Secure Is the Cloud, Really? August 28, 2012
Cloud security skeptics were given yet another reason to doubt the fortitude of online storage when the strange tale of Mat Honan emerged earlier this month. Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life.
|
Security Sleuths Lay Blame on Apple for SMS Vulnerability August 27, 2012
Research released last week fingered the iPhone as the source of a text messaging exploit that could be used to steal sensitive information from smartphone users or work mischief on their hardware. The flaw, revealed by a well-known security researcher and jailbreaker of iPhones, involves the "reply to" line in SMS messages.
|
|
Anons Pelt UK Authorities With Cyberattacks August 21, 2012
Today in international tech news: Hackers deliver their particular brand of justice in the UK and Russia, downing government sites on behalf of Julian Assange in Britain and Pussy Riot in Russia. Also: China and Taiwan are uniting -- by data cables, that is -- while China's top two video platforms could soon merge after a shareholder vote.
|
Don't Trust That Text August 20, 2012
A well-known iOS hacker who uses the handle "pod2g" revealed a flaw in Apple's mobile operating system, iOS, that he says can be exploited to alter the "reply to" information in SMS messages. Such a tactic could be used by cybermiscreants to pry sensitive information from the recipient of a message or divert them to a malicious website.
|
|
As Middle Eastern Malware Goes, Shamoon's a Strange Bird August 17, 2012
Yet another malware attack has emerged in the Middle East. Called "Shamoon," it's hit computers in Saudi Aramco's network, causing a sudden disruption. The specific malware delivered is being referred to as "W32.Disttrack" by Symantec. The attack as a whole was named "Shamoon" after the title of a folder found within the malware executable.
|
The Honan Affair and the Cloud's Dark Lining August 13, 2012
The attack last week on journalist Mat Honan's iCloud account has the potential to strip the silver lining from the cybernimbus. Honan had his digital life destroyed when hackers, in a convoluted effort to hijack his Twitter account, ended up trashing everything connected to his Apple iCloud account.
|
|
Hackers Raid Blizzard, Make Off With Answers to Secret Questions August 11, 2012
Hackers have hit Blizzard's Battle.net online gaming network, stealing users' email addresses, the answers to their personal security questions, and information relating to mobile and dial-in authenticators. The intruders hit the company's North American servers, which support players in North America, Latin America, Australia, New Zealand and Southeast Asia.
|
Flame Malware Ignites Gauss in Lebanon August 10, 2012
The fallout from the Flame malware that was identified in May continues. Ongoing research into the malware has led antivirus vendor Kaspersky Lab to discover a new malware platform, which it has named "Gauss." This platform has several similarities to Flame, Kaspersky said.
|
See More Articles in Cybercrime Section >>

Headline Feeds




















