Latest Posts | Page 133


It could have been a script from a B movie. Top military officials from the North Atlantic Treaty Organization fell victim to a cyber attack because they simply accepted a fake friend request on Facebook. In a tried and true attack, cyber criminals once again exploited users' implicit an unquestioning trust on social networks by spoofing a Facebook page impersonating the Supreme Allied Commander Europe (SACEUR) Admiral James Stavridis. The social engineering attack was likely an attempt to glean email addresses, login credentials and other bits... [Read More]
by RSS Stefanie Hoffman  |  Mar 14, 2012  |  Filed in: Industry Trends
Tags:
To say the least, Apple has had a lot on its plate lately. The company and extended gadget community is still abuzz with news of the recently unveiled iPad 3, Apple TV and even an updated iTunes, announced last week. But alongside its newly revealed tech toys, Apple has of late delivered a one-two punch with a pair of monster updates that essentially give a security makeover to its Safari Web browser and iOS platforms. On Monday Cupertino issued an update for its Web browser that patched a record 83 security vulnerabilities in its latest Safari... [Read More]
by RSS Stefanie Hoffman  |  Mar 13, 2012  |  Filed in: Industry Trends
Tags:
Fresh on the heels of RSA, the security world is still rife with high-profile hacks, international crackdowns and mega security updates. Here is a look at last week's highlights. Google Chrome Compromised, Patched: It might be a record, but Google was uber quick to patch critical zero-day security holes in its Chrome browser less than 24 hours after they were exposed in two separate attacks during the CanSecWest conference Wednesday. In one hack, Vupen Security researchers broke into the Chrome browser in a matter of minutes during Pwn2Own, the... [Read More]
by RSS Stefanie Hoffman  |  Mar 12, 2012  |  Filed in: Industry Trends
Tags:
With a seemingly unstoppable upsurge of targeted attacks in recent years, hackers are naturally finding better ways to acquire personal identifying information to really hone in on their victims. They're called second stage attacks. Specifically, second stage attacks are multi-faceted cyber assaults in which the attackers infiltrate a network and steal data from one organization to leverage a more targeted, victim-specific attack on another account. “Second stage attacks are more effective and more dangerous because of the targeted aspect, and... [Read More]
by RSS Stefanie Hoffman  |  Mar 12, 2012  |  Filed in: Industry Trends
Tags:
No stranger to privacy issues, the search giant Google seems to have taken an even bigger page out of Facebook’s manual lately. And privacy advocates are revving their engines. Google's newly rewritten privacy policy, enacted Thursday, essentially aggregates all user data from its combined services into one uber database, with an objective to create more comprehensive—and much more detailed—user profiles that would help the search giant better target it ads, among other things. Altogether, the new privacy rules combine 60 out of over 70... [Read More]
by RSS Stefanie Hoffman  |  Mar 02, 2012  |  Filed in: Industry Trends
Tags:
Malware, like anything else, runs in cycles. And as of late, trends seem to be pointing to extortion as the latest developing theme. The ransom theme was given center stage April of last year after an attacker targeted Hyundai Capital's network in South Korea and swiped copious data belonging to more than 420,000 customers. The attacker demanded a ransom of several hundred million Korean won, which, if not paid, would trigger a release of confidential customer names, residence registration numbers, mobile phone numbers and e-mail addresses. The... [Read More]
by RSS Stefanie Hoffman  |  Mar 01, 2012  |  Filed in: Industry Trends
Tags:
RSA Conference is upon us once again. This year's RSA Conference is hosting around 350 exhibitors, and with the economy slowly on the mend, the show promises to have strong attendance, according to inside sources. In addition to the usual array of raffles, costumes, and “Wheel of Fortune” gameshow gimics, the show floor was abuzz with its own unique alphabet soup (e.g. BYOD, APTs) while mobile threats, securing the cloud and virtualized platforms, and targeted attacks became the topics_ du jour_. So what's all the rage in network security?... [Read More]
by RSS Stefanie Hoffman  |  Feb 29, 2012  |  Filed in: Industry Trends
Tags:
It's that time of year again. With less than two months to go before the April 15 tax deadline, scammers are in full swing, eager to separate taxpayers from their hard earned refunds. No doubt, scammers will pelt unsuspecting victims with a slew of social engineering ploys for bigger-than-expected or fast track refunds, official looking alerts warning users about tax complications, offers for some kind of “too-good-to-be-true” online tax deal or service, or e-mails impersonating the IRS in search of personally identifying information. This... [Read More]
by RSS Stefanie Hoffman  |  Feb 28, 2012  |  Filed in: Industry Trends
Tags:
This week, the issue of online data privacy received more than its fair share of attention. And with good reason. The Obama administration announced Thursday that it intended to place increased importance on online privacy with the proposed "Consumer Privacy Bill of Rights,” designed to give users a greater say in how their online information is handled, while establishing protections to prevent consumer data from being misused by businesses or advertisers. The proposed Bill of Rights—a collaborative effort to be spearheaded by the Commerce... [Read More]
by RSS Stefanie Hoffman  |  Feb 24, 2012  |  Filed in: Industry Trends
Tags:
The term "survival of the fittest" seems to be particularly apt when it comes to the Koobface worm. Over the years, the notorious social networking botnet has survived an almost unrelenting media spotlight, serial security improvements and even a massive international takedown, and has thus far managed to stay on its feet. And its adaptability could possibly bode well as it enters the next phase of its existence. The prolific botnet Koobface, the notorious anagram of Facebook, got its start hijacking social networking accounts via a myriad of social... [Read More]
by RSS Stefanie Hoffman  |  Feb 23, 2012  |  Filed in: Industry Trends
Tags: