Industry Trends & News | Page 66


In recent weeks, virtualization giant VMware has been scrambling to release security patches for an ESX server hypervisor source code leak that was published in April and allegedly perpetrated by a hacker from the global collective Anonymous. The recent patch repaired critical vulnerabilities that could have enabled an attacker to execute malicious code remotely on the host and leave an end-user’s virtualized environment susceptible to a compromising cyber attack. Among other things, the incident called into question the security of virtualized... [Read More]
by RSS Stefanie Hoffman  |  May 10, 2012  |  Filed in: Industry Trends & News
Both Microsoft and Adobe delivered their one-two punch that aimed at plugging security holes and halting active exploits dead in their tracks for the month of May. And while the Microsoft and Adobe both addressed critical flaws affecting a wide swath of users, neither bulletin will likely overwhelm users this month. For its May Patch Tuesday security update, Microsoft released a total of seven bulletins, three designated with the highest severity rating of “critical,” repairing a whopping 23 vulnerabilities in Microsoft Windows, Office, Silverlight... [Read More]
by RSS Stefanie Hoffman  |  May 09, 2012  |  Filed in: Industry Trends & News
Vulnerabilities and more vulnerabilities plagued the security landscape the week of April 30-May 5. Adobe patched a major Flash flaw, while security experts warned of gaping holes in PHP. Meanwhile, it appears that Intel is going to do something with its McAfee purchase after all. Here's a look at this week in security. Adobe Patches Critical Flaw: Adobe released a patch last week for a critical Flash vulnerability pivotal in targeted attacks that exploit a vulnerable version of Flash on Windows running the Internet Explorer Web browser. Altogether,... [Read More]
by RSS Stefanie Hoffman  |  May 08, 2012  |  Filed in: Industry Trends & News
You ran all the scans, conducted all the tests and yep…you've got malware Last month, we detailed steps you could take in those critical and panic-filled moments when you realized that you might have clicked on a malicious link or opened an infected attachment, but weren’t quite sure you’d been infected. Now, in a follow-up, we'll note a few actions you can take in the event that malware was indeed installed on your computer. First, nothing substitutes for the expertise of an IT professional for an accurate assessment of your computer’s... [Read More]
by RSS Stefanie Hoffman  |  May 02, 2012  |  Filed in: Industry Trends & News
No doubt, the recent groundswell of legislation around cybercrime and cyber security has served to raise public awareness and could potentially spur security sales as the issue remains on the forefront of political and social debate. But with the barrage of newly introduced cybersecurity legislation, it’s easy to get lost in the melee of political, technical and legislative jargon, not to mention a sea of vaguely understood acronyms. Here is a bit of a guide that might make the path through this jungle a tad easier. ** Cyber Intelligence Sharing... [Read More]
by RSS Stefanie Hoffman  |  May 01, 2012  |  Filed in: Industry Trends & News
Infections and exploits plagued this week in security, affecting everything from the Mac OS X to Oracle database servers. High profile leaks and a passage of a controversial information sharing bill also graced the security landscape. Here's a look at April 23-27. VMware Source Code Leaked: Last week, VMware confirmed an attack that led to the online publication of source code for its ESX hypervisor and said that more could be on the way. The individual stepping up to take credit for the attack was a hacker going by the handle of Hardcore Charlie,... [Read More]
by RSS Stefanie Hoffman  |  Apr 30, 2012  |  Filed in: Industry Trends & News
It seems that lately, threats that were once were simply known as “malware” or “viruses” have been elevated to the status of Advanced Persistent Threat (APT), a term that has strategically been used to strike fear in the hearts of consumers. These days, APTs have a much more common presence in the media, and some of the most notorious have included major global threats such as Ghostnet (a botnet deployed in various offices and embassies to monitor the Dalai Lama agenda), Shady RAT (like Ghostnet but with government and global corporate... [Read More]
by RSS Stefanie Hoffman  |  Apr 25, 2012  |  Filed in: Industry Trends & News
In April's Security Minute, Derek Manky discusses new Tigerbot Android Malware, 2Pac Shakur-related Web links, and interesting new developments in Ransomware code. [Read More]
by RSS Rick Popko  |  Apr 24, 2012  |  Filed in: Industry Trends & News
Tags:
Among other things, Anonymous was up to its usual shenanigans, a new Android attack that emerged already tainted a brand new photo app and Apple malware continued to baffle inexperienced Mac users naive to the ways of security threats. Here's a look at the security landscape for April 16-20. Surprise! Another Mac Threat: Last week, yet another Mac Trojan was found on the security threatscape wreaking havoc on the once typically sheltered Mac OS X users. Specifically, the new Mac Trojan, dubbed Backdoor OSX SabPub.a, exploits a Java vulnerability... [Read More]
by RSS Stefanie Hoffman  |  Apr 23, 2012  |  Filed in: Industry Trends & News
For the most part, we all know what NOT to do when it comes to security best practices. We all know not to click on unsolicited links embedded in e-mail or IM. We all know not to open any strange attachments or respond to suspicious or unfamiliar e-mails. And most people know that many--but certainly not all--of those surveys trolling around Facebook will probably send a viral worm or some kind of infection to everyone on your contact list. But what happens if—in a moment of weakness—we unintentionally do click on a link -- despite all of our... [Read More]
by RSS Stefanie Hoffman  |  Apr 20, 2012  |  Filed in: Industry Trends & News