Latest Posts

69dafe8b58066478aea48f3d0f384820

Y-12 Nuclear Weapons Plant Targeted in Cyberattack

June 15, 2011 Added by:Headlines

"Y-12's external website has been replaced with a temporary information page. At this point, there is no evidence that any plant-wide email or internal computing services have been affected, nor has any classified or sensitive information been accessed or affected by this incident..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twelve Tips for Combating Identity Theft

June 15, 2011 Added by:Headlines

The bad news is that the cost of remediating an identity theft event increased by sixty-three percent over the same time period, and the incidence of "friendly fraud" - identity theft by an acquaintance of the victim - rose seven percent...

Comments  (1)

7377f47f95a1202ea8d330061b674dea

Gartner Security and Risk Management Summit 2011

June 14, 2011 Added by:Lawrence Pingree

Increases in the complexity and volume of targeted attacks coupled with the necessity for companies to address compliance issues continues to support healthy security market growth. We will be examining the key security issues at the upcoming Gartner Security and Risk Management Summit...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Worse Than Zombies: The Mobile Botnets Are Coming

June 14, 2011 Added by:Kelly Colgan

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Takes Aim at Bernanke and Federal Reserve

June 14, 2011 Added by:Headlines

"We cannot remain passive while our future is going up in flames. It is time for us to stand up for ourselves. It is time for you to stand up for yourself. We must restore the rule of law and fight back against the organized criminal class. We must now launch 'Operation Empire State Rebellion..."

Comments  (1)

37d5f81e2277051bc17116221040d51c

OddJob Trojan Hijacks Online Banking Sessions

June 14, 2011 Added by:Robert Siciliano

The OddJob Trojan hijacks online banking sessions, keeping users’ accounts open after they think they’ve quit. Hackers can then access the open account to make fraudulent transactions. When your computer’s security is lax, you’re vulnerable to malware or malicious software...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hey CISO, Your Budget is Killing You...

June 14, 2011 Added by:Rafal Los

You've wrestled with justifying initiatives, programs, and security-driven innovation you want to implement to keep the company safe and lower the risk profile, but what you may not know is that the budget you've been working so hard to grow may actually be secretly killing you...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CIA Chief: Cyberattack Could Be Next Pearl Harbor

June 14, 2011 Added by:Headlines

“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. It is going to take both defensive measures as well as aggressive measures to deal with it..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

From Lulz to Global Espionage: The Age of the Cracker

June 14, 2011 Added by:Infosec Island Admin

For groups like Lulzsec, they are passing from the nuisance category into perceived enemies of the state. Once they start attacking government and military targets, they are likely to see a more hardened response from intelligence agencies as well as the likes of the FBI...

Comments  (1)

7c5c876d1933023ac375eead04302e1a

You Can't Buy DLP

June 13, 2011 Added by:Boris Sverdlik

To implement a data loss solution, you must take a holistic approach to identify the problem, threat vectors and vulnerabilities. You must understand where your sensitive data lives within your organization. This can’t be done with a tool, regardless of how good they claim it is...

Comments  (3)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy by Design: Key Concern for VCs and Start-Ups

June 13, 2011 Added by:David Navetta

Privacy by design makes privacy an essential component of the core product or service a company delivers. Spotting privacy issues and addressing concerns before launch aligns products and services with consumer expectations and can save everyone from future headaches...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

My Take on the IMF Hack

June 13, 2011 Added by:Luis Corrons

Even though there are no details on the attack, speculation started talking about a "foreign country" being behind the attack, many fingers pointing at China (as usual) and talking about cyberwarfare. But it also makes sense that this is not a targeted attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Zaps More Infected Android Applications

June 13, 2011 Added by:Headlines

"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Microsoft Gives Source Code to Chinese Government

June 13, 2011 Added by:Danny Lieberman

Having access to Windows source code has made it easier for Chinese cyber attackers to write attack code to penetrate and compromise US defense contractors, critical infrastructure and activist groups like change.org - who all still use highly vulnerable Windows monoculture products...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

IMF May Be Latest Victim of RSA SecurID Hack

June 13, 2011 Added by:Headlines

"There are still dozens of similar yet still undisclosed breaches that have taken place in the U.S. government and defense domain during the same time frame. My guess is that it is the same set of bad actors who are behind the attacks focused on military, government and economic intelligence...

Comments  (2)

F7e202a206691e473e509d080620af68

Malvertising: The Use of Malicious Ads to Install Malware

June 13, 2011 Added by:Lenny Zeltser

Perhaps the future will bring malvertising campaigns where Flash-based ads usurp the victim's CPU cycles to run computations, such as distributed password cracking. Another potential is to use the browser for Bitcoin mining; such operations are already possible using pure JavaScript...

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

Security - Stupid Is As Stupid Does

June 12, 2011 Added by:J. Oquendo

With so much being spent on security - Firewalls, Intrusion Detection Systems, Intrusion 'Prevention' Systems, Intrusion 'Tolerance' Systems, Data Loss Prevention, Certified Security Professionals, Standards, Guidelines, and the list goes on, why are these companies failing?

Comments  (18)

49afa3a1bba5280af6c4bf2fb5ea7669

Citigroup: Housekeeping Isn’t Glamorous - Only Critical

June 12, 2011 Added by:Mike Meikle

Development for online banking software is handled offshore, which can be a challenge when it comes to infusing the application with information security best practices from the foundation up. As to what Citigroup could have done better, it depends on how the breach was perpetrated...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Five Ways to Keep Your Kids’ Identity Safe

June 12, 2011 Added by:Kelly Colgan

In a recent study of 42,000 children, Carnegie Mellon found that 10.2 percent of their Social Security numbers had been misused—more than 50 times the rate for the adults studied...

Comments  (0)