Blog Posts Tagged with "Attacks"
May 06, 2011 Added by:Headlines
Multi-platform malware is not entirely new, but with the increasing popularity of Apple products in the marketplace, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems...
May 05, 2011 Added by:J. Oquendo
In a conventional war, superpowers still have deterrents: nuclear weapons, financial fallout and so on. In a cyberwar, there is nothing more than imagined deterrents because as an attacker, anonymity will reign supreme. Deterrents do not apply on the cyber battlefield...
May 05, 2011 Added by:Global Knowledge
A simple Android app called Caribou is able to open doors with a simple push of a button once the IP address of the server is identified. When you think of the number of access card systems installed in HOA’s and businesses across the nation, the enormity of the risk becomes easily apparent...
May 01, 2011 Added by:Rafal Los
The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...
April 28, 2011 Added by:Don Eijndhoven
The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...
April 24, 2011 Added by:Rafal Los
We can all agree that there are enough *exploitable security defects* in software that virtually every organization on the planet can (and will) be broken into given enough time - so where does that leave us? More importantly, what does that have to do with cloud computing?
April 19, 2011 Added by:Sasha Nunke
Vulnerabilities in web applications are now the largest source of enterprise security attacks. Web application vulnerabilities accounted for over 55% of all vulnerabilities disclosed in 2010, according to an IBM X-Force study. That may be the tip of the iceberg...
April 13, 2011 Added by:Headlines
The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...
April 12, 2011 Added by:Headlines
Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...
April 09, 2011 Added by:Brent Huston
Perhaps you will be lucky and never experience a bad information security incident. But if you do, you will be very glad indeed if you have a well practiced information security incident response program in place...
April 07, 2011 Added by:Alexander Polyakov
An attack on a network is a progressive action. We escalate our rights step-by-step to a domain administrator. Even casual un-privileged users can give us access to some shared resources. But how do we get these user rights? We can enforce users to authenticate on controlled a machine...
April 05, 2011 Added by:Headlines
"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."
April 01, 2011 Added by:Headlines
"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."
March 31, 2011 Added by:Headlines
"Today, we see constant attempts by cyber means to steal the nation's secrets, as well as information vital to the effective operation of critical national industries and infrastructure, not to mention commercial intelligence and criminal fraud..."
March 31, 2011 Added by:Dan Dieterle
Serious security gaps were found at NASA during a recent audit. The fact that a government run entity has been attacked, and then apparently ignored a plan to remedy the situation, speaks volumes about our nation's ability - or maybe better said desire - to thwart hacking attempts...
March 29, 2011 Added by:Headlines
Boodaei calls the attack "VIGNS" - short for "Vanity Infection from Google News Searches" - and the purpose is to create the circumstance where the targeted victim will enable the attacker to circumvent security measures and infect the executive's computer with malware...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013