01/25/2013 04: 18 (Reuters Top News)
(Repeats Thursday report with no changes) Cyber, militant attacks overshadow Davos oil gathering North Africa likely to suffer oil investment slowdown By Dmitry Zhdannikov DAVOS, Jan 24 (Reuters) – Oil executives are resigned to a rise in security costs which will be steep even for an indust
01/25/2013 02: 28 (Help Net Security)
Making online purchases and secure internet browsing is safer and easier than ever with the launch of Kanguru’s new Defender DualTrust, a new secure online access and encrypted USB storage device developed jointly by Kanguru and Deepnet Security.
01/25/2013 02: 17 (Computerworld Malaysia)
Post highlighting embarrassing things raises questions of user privacy with Graph Search, which Facebook users cannot opt out of Facebook’s new Graph Search has security experts warning people who use the social network to raise their privacy settings in order to avoid embarrassment or becoming vic
01/25/2013 01: 23 (Computerworld Malaysia)
ACS calls for registration of ICT professionals and more research and development funding. The federal government’s $1.46 billion funding in improvements to cyber security networks and establishment of an Australian Cyber Security Centre has received a largely positive response from information sec
01/25/2013 00: 25 (Help Net Security)
Webroot announced the availability of a portfolio of internet security solutions that give mobile technology providers – from carriers to device manufacturers to mobile device management (MDM) companies – easily deployable and cost-effective services to make security an integral part of their own of
01/24/2013 20: 31 (Yahoo! News Canada)
01/24/2013 20: 04 (Yahoo! News)
If there are two things that most of us carry with us every waking moment of the day, it’s our phones and wallets. So, in the name of convenience, some of the biggest technology companies are hard at work to combine the two.
01/24/2013 19: 24 (Taunton Daily Gazette (AP))
Similar to popular email phishing scams, ‘catfishing” scams occur when a scammer assumes a persona on a social networking site and then creates an entire false identity using the pictures, hobbies, interests and even friends of someone else.
01/24/2013 18: 35 (Isssource.com)
Server-based botnets and encrypted layer attacks are new attack tools challenging organizations during distributed denial of service (DDoS) attacks, according to a new report.
01/24/2013 18: 29 (The Hill – Blog)
The Topline: The Pentagon on laid out a three-year plan for integrating women into most combat positions on Thursday as the Pentagon’s leaders officially ended the ban on women in combat.
01/24/2013 18: 22 (Yahoo! News Canada)
01/24/2013 17: 13 (ComputerWorld)
A prominent GOP lawmaker urges President Obama to not issue an executive order mandating new cybersecurity provisions
01/24/2013 14: 57 (The Daily Pilot)
Computer scientists at UC Irvine have developed an app that stores encrypted segments of DNA information on smartphones, giving way to countless possible medical and social uses, according to KTLA.
01/24/2013 14: 36 (Threat Post)
The United States Senate says it will prioritize the passage of a comprehensive cybersecurity bill designed to fortify the nation’s public and private IT systems in this session of Congress.
01/24/2013 07: 49 (Help Net Security)
Facebook users are advised to be on the lookout for bogus personal messages supposedly sent by the Facebook Security Team. The message claims that the users’ account has been reported for violating “policies that are considered annoying or insulting Facebook users,” and that they have to “reconfirm”
01/24/2013 07: 40 (Bradenton Herald)
LONDON — British regulators fined Sony 250,000 pounds ($396,100) on Thursday for having insufficient security measures to prevent a cyberattack on its PlayStation Network.
01/24/2013 05: 52 (Android News)
All of this said their are ways to protect your Android device and they should be implemented as quickly as possible, even if it is just for peace of mind.
01/24/2013 04: 18 (Help Net Security)
Half of all organizations EVault surveyed in the USA, UK, France, Germany, and the Netherlands say they are managing more data now than they were a year ago, and 70 percent of those same organizations expect that the volumes of data they manage will only continue to climb.
01/24/2013 01: 43 (WCFCourier.com)
Google is being pulled into an increasing number of police and government investigations around the world as authorities seek to learn more about the people who use its Internet search engine, email and other services.
01/24/2013 01: 43 (WCFCourier.com)
It can store the information from a million CDs in a space no bigger than your little finger, and could keep it safe for centuries. Is this some new electronic gadget? Nope.
01/23/2013 23: 02 (Metro)
01/23/2013 21: 46 (Computer World Australia)
Based in Canberra, industry, state and territory partners will collaborate with government agencies.
01/23/2013 19: 10 (The Globe and Mail)
01/23/2013 09: 35 (Threat Post)
The networks of government agencies and the military are under constant attack from a variety of sources, and the U.S., like most other countries, relies on those networks to not just run daily operations, but to support missions around the world.
01/23/2013 07: 40 (Power Engineering International)
A rush towards â€˜Smartâ€™ technology, without an associated hike in security, is laying the power sector open to devastating cyber attacks, warns the head of a UK-based security specialist.
01/23/2013 04: 42 (Computerworld)
Microsoft could take legal action against the resellers if settlement isn’t reached
01/23/2013 04: 33 (Equities.com)
By Jennifer Bjorhus, Star Tribune (Minneapolis) McClatchy-Tribune Information Services Jan. 23–ATM swindles have moved beyond mere skimming — planting tiny cameras on gas pumps, for instance, to spy on your swipe and steal your cash.
01/23/2013 02: 48 (ComputerWorld Singapore)
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday.
01/23/2013 01: 13 (Geektown Blog)
01/22/2013 23: 21 (Computer World Australia)
More than 3000 visits were made to fake app store, Android Express Play
01/22/2013 22: 52 (Macon.com)
You’ve heard of Tupperware parties and maybe even Botox parties, but have you ever heard of an Internet safety party? Theresa Payton, former White House chief information officer and co-author of “Protecting Your Internet Identity: Are You Naked Online?” is offering to host a customized version of
01/22/2013 22: 30 (Indianapolis Star)
At first glance, the five men bear little resemblance to each other. One is a 23-year-old from New Palestine. Another, a 42-year-old from Noblesville.
01/22/2013 22: 15 (My San Antonio (AP))
Crippling uncertainty continues, with March 1 now the deadline for deep cuts in military and federal domestic spending that would last a decade. But for one portion of San Antonio’s military community, the outlook for growth remains positive.
01/22/2013 21: 32 (News 10 ABC- WTEN)
/PRNewswire-USNewswire/ — After three impressive preliminary rounds, 28 teams of high school students have advanced to the National Finals Competition of the nation’s largest and fastest growing high school cyber defense competition – CyberPatriot V! CyberPatriot-The National High School Cyber Def
01/22/2013 19: 06 (The Guardian)
Prime Minister Julia Gillard has warned that Australia is a prime target for malicious cyber attack by hackers and nations. Launching the nation’s first national security strategy today in Canberra, Ms Gillard announced the establishment of a new Australian Cyber Security Centre.
01/22/2013 16: 15 (Isssource.com)
In a coordinated takedown effort, an organization dedicated to fighting spam took over the 300,000-strong Virut botnet late last week. The Virut malware spreads by inserting malicious code into clean executable files and by copying itself to fixed, attached and shared network drives, said officials
01/22/2013 13: 58 (ComputerWorld)
Speculation, rumors, and hopes about the upcoming BlackBerry 10 launch next week have sent Research in Motion’s (RIMM – Nasdaq) stock price soaring.
01/22/2013 12: 36 (Help Net Security)
Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan with a plugin called msg.
01/22/2013 12: 23 (Threat Post)
The website of a popular watch retailer is reportedly redirecting users that visit the site on Android-based devices to a number of malicious domains serving up premium rate SMS malware.
01/22/2013 11: 45 (Threat Post)
Rarely a day goes by without mention of a targeted attack against some government-related website, massive disruptions in online banking services, or critical vulnerabilities in specialized software running our power plants and water supplies.
01/22/2013 10: 07 (Equities.com)
IDG Reporter Al Bawaba Ltd. It’s all too easy to neglect data security, especially for a small business. While bigger organisations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security.
01/22/2013 00: 05 (DVIDS)
By: Senior Airman Jennifer Hotte and Senior Airman Ian Caple WASHINGTON – In support of the 57th Presidential Inauguration, National Guard computer network defense teams from seven states conducted defensive cyber operations in Washington, DC.
01/21/2013 22: 18 (ComputerWorld Singapore)
Cyber attacks of all forms will continue to pose a threat to organisations this year. According to a recent data breach report by Verizon, authentication attacks and “hacktivism” are some of the top threats that organisations should be prepared for.
01/21/2013 22: 01 (Threat Post)
A Canadian college student was expelled after reporting a vulnerability in the school’s Web site that potentially exposed private data on more than 250,000 students.
01/21/2013 20: 21 (Computerworld Malaysia)
Attackers still control some domains used by the botnet, the researchers say. Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, an
01/21/2013 18: 40 (Yahoo! Canada Finance)
01/21/2013 18: 08 (Computerworld Blogs)
The recently released Java 7 Update 11 changed security rules that had just been introduced with Update 10. The ink was barely dry, so to speak. Here I hope to explain the rules for running Java programs embedded in web pages.
01/21/2013 17: 05 (CIO Today)
A smartphone or “smartcard-embedded finger ring,” wrote the Google authors, could “authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity.” The Google authors call for the “primary authenticator” to be a piece of hardware, bu
01/21/2013 16: 30 (Isssource.com)
There is a new version of the Shylock malware spreading through Skype and is playing off the fact Microsoft is about to kill its Messenger application in favor of Skype.
01/21/2013 15: 29 (Threat Post)
Early research from Symantec estimates that spammers behind a new type of Android malware may have already stolen “between 75,000 and 450,000 pieces of personal information” from Japanese users.
01/21/2013 15: 14 (Isssource.com)
There were vulnerabilities in the websites of Microsoft and Twilio and flaws in the ProActive content management system (CMS), a researcher said. Twilio rushed to address the Cross-site request forgery (CSRF) vulnerability identified by researcher Rafay Baloch.
01/21/2013 14: 58 (FederalNewsRadio.com)
The Commerce Department wants to fix a glaring cyber weakness. It lacks full centralized enterprisewide cybersecurity reporting capabilities across its 90,000 computers.
01/21/2013 14: 18 (Mobile & Apps)
Microsoft’s free anti-virus product Security Essentials, for the second time in a row, failed to win quality certification by AV-Test Institute. AV-Test is a Germany-based test firm that evaluates both free and paid anti-virus tools and issues certifications for the most reliable anti-virus software.
01/21/2013 11: 36 (Help Net Security)
Last week, the European Commission proposed new legislation to require major tech firms like Google and Facebook to report any security breaches to local cyber crime authorities or risk sanctions like fines.
01/21/2013 10: 38 (Mobile & Apps)
Chrome and Firefox browser users may have some difficulty accessing The Pirate Bay, as Google has now deemed the site as a malware distributor. In fact, any other site that uses bayimg, the image hosting service The Pirate Bay (TPB) founded back in 2007, is in the same situation.
01/21/2013 07: 56 (Help Net Security)
The Polish Research and Academic Computer Network (NASK), the national registry of the .pl domain and founder of CERT Polska, has announced on Friday that they took over 23 domains that served as C&C servers for the Virut botnet.
01/21/2013 07: 03 (Federal Times)
Federal agencies are girding for mass furloughs and other cutbacks as across-the-board budget reductions loom in barely a month. “Hundreds of thousands” of employees face unpaid time off if those cuts take effect, Jeff Zients, acting chief of the Office of Management and Budget, wrote in a Jan.
01/20/2013 08: 35 (Equities.com)
By Dave Solomon, The New Hampshire Union Leader, Manchester McClatchy-Tribune Information Services Jan. 20–NASHUA — If you still think of the typical computer hacker as a nerdy teenager working from his mother’s basement to engage in online vandalism, think again.
01/20/2013 03: 46 (Equities.com)
IDG Reporter Al Bawaba Ltd. Researchers from a Poland-based vulnerability research firm on Friday announced that they had found vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software’s security sandbox and execute arbitrary code on computers.
01/20/2013 00: 00 (Carroll County Times)
Many technology experts are declaring that a top security threats for 2013 will be cyber-attacks on mobile devices. In fact, smishing, a form of hacking information from cell phones (derived from SMS, or Small Message Service), is already running rampant for both consumers and business owners alike.
01/19/2013 20: 36 (ComputerWorld Singapore)
CyberSecurity Malaysia’s CEO comes from Ministry of Science Technology and Innovation. Photo – Dr Amirudin bin Abdul Wahab, CEO, CyberSecurity Malaysia National cyber security agency CyberSecurity Malaysia has appointed Dr Amirudin bin Abdul Wahab as its new chief executive officer with effect fro
01/19/2013 16: 59 (Colorado Springs Gazette)
Lt. Gen. Mike Gould planned to meet with the president of Brigham Young University on Thursday. The leader of another university took his place. Gould, the Air Force Academy’s superintendent, also had plans to fly into Dallas this week and present former academy football star Chad Hennings with the
01/19/2013 13: 54 (Business Review Europe)
Tim Pat-Dufficy, managing director of hosting experts ServerSpace, explains why business owners need to be aware of the risks of insufficient security measures
01/19/2013 12: 08 (Android in Canada Blog)
01/19/2013 12: 05 (Herald De Paris)
by Christie Thompson When Reddit co-founder and internet freedom activist Aaron Swartz committed suicide last Friday, he was facing up to 13 felony counts, 50 years in prison, and millions of dollars in fines.
01/19/2013 09: 15 (The Hill – Blog)
Rep. Zoe Lofgren (D-Calif.) wants to overhaul a computer hacking law in the wake of the suicide of Internet activist Aaron Swartz, but she warns it will not be an easy task.
01/19/2013 09: 00 (OregonLive.com)
, updated January 19, 2013 at 7: 13 AM View/Post Comments U.S. Bank this month announced Portland is one of two cities where it’s testing an iPhone case that enables customers to wave their phone at store checkouts to pay.
01/19/2013 05: 44 (Boston.com)
V3 Click anti-malware device by AhnLab Inc. $39.95 at Amazon.com Millions of us are too lazy to install software that can protect our computers from viruses and other malware.
01/19/2013 03: 05 (The StarPhoenix)
01/19/2013 01: 39 (Equities.com)
Targeted News Service WASHINGTON, Jan. 18 — The U.S. Air Force issued the following story: Two Airmen with the Joint Task Force – National Capital Region Public Affairs created a free, public cellphone application that allows users to stay informed about the 57th Presidential Inauguration.
01/18/2013 01: 46 (Computerworld Malaysia)
The malware, ironically, does not actually exploit the Java vulnerabilities, according to Trend Micro. Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
01/18/2013 01: 27 (Computerworld Malaysia)
Businesses need to be aware of, and prepared for, mobile adware, or “madware”, in 2013, according to Symantec Pacific region specialist solutions director, Sean Kopelke, who includes social media, mobile and Cloud threats in his warning.
01/18/2013 00: 01 (The Powdersville Post)
(BPT) – Tax time is always tough. Whether you will owe or anticipate a refund, plan to do your own taxes or pay a professional to do them for you, preparing and filing your taxes can be a tedious task.
01/17/2013 23: 18 (Yahoo! News)
WASHINGTON (Reuters) – Iran responded to a 2010 cyber attack on its nuclear facilities by beefing up its own cyber capabilities, and will be a “force to be reckoned with” in the future, a senior U.
01/17/2013 22: 51 (Computerworld Malaysia)
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client.
01/17/2013 22: 22 (ComputerWorld Singapore)
Businesses increasingly use whitelisting to keep the bad guys out but now it turns out that criminals are employing the same tactics to target favoured victims, security firm RSA has reported.
01/17/2013 22: 21 (ComputerWorld Singapore)
European Commission proposals for a strategy on cybercrime have come under fire before they have even been released. The Commission is due to present its plan for a European Strategy for Internet Security on Wednesday, but Digital Agenda Commissioner Neelie Kroes has already said that under the pro
01/17/2013 20: 47 (Computerworld Malaysia)
Malware is still the biggest threat to mobile security, but most mobile device management (MDM) strategies tend to focus on securing the physical device in case of loss of theft, according to Peter Gibbons, head of Information Security at Network Rail.
01/17/2013 19: 06 (Bloomberg)
Iran’s developing ability to launch cyber attacks will make it “a force to be reckoned with,” the head of the U.S. Air Force Space Command said. General William Shelton said the Iranians are responding to an attack on the computer operating system that runs the uranium enrichment facilities….
01/17/2013 18: 24 (FederalNewsRadio.com)
In the minds of many, information security and information sharing would seem to be polar opposites. But in the White House’s new national strategy on information sharing released last month, the two concepts are paired together.
01/17/2013 16: 47 (CloudTimes)
The number of patents registered in the U.S. hit a record last year, with the giant blue once again at the forefront of technological giants, who maintain a war on intellectual property.
01/17/2013 16: 46 (Isssource.com)
There is a new type of phishing kit that allows cybercriminals to ensure only certain users can access their phishing websites. Because only users that are on “the list” can access the site, the crime kit’s name: “Bouncer.
01/17/2013 16: 01 (IT Business)
01/17/2013 14: 20 (Threat Post)
The Red October espionage malware campaign is providing security researchers with a deep dive into the complexity of targeted attacks, which in this case made use of more than 1,000 malware modules for everything from reconnaissance on targets to exfiltration of data to command and control servers.
01/17/2013 05: 43 (Fox 19)
This article was originally distributed via PRWeb. PRWeb, WorldNow and this Site make no warranties or representations in connection therewith. SOURCE: Prolexic Technologies Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today announced that t
01/17/2013 05: 31 (Help Net Security)
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape.
01/17/2013 04: 00 (TheState.com)
COLUMBIA, SC — South Carolina should know by May 1 how to tackle some of its most severe cybersecurity shortcomings and how much the fix might cost, state officials told lawmakers Wednesday.
01/17/2013 03: 48 (Equities.com)
IDG Reporter Al Bawaba Ltd. Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming language still threatens the security of millions of PCs.
01/17/2013 01: 21 (ComputerWorld Singapore)
Microsoft vowed on Wednesday to improve two of its security products after both failed to pass an evaluation by a Germany security software testing organization.
01/17/2013 01: 13 (Fort hood sentinel)
WASHINGTON – The “perfect storm of budget uncertainty” howling around his department is the biggest immediate threat facing the U.S. military, Defense Secretary Leon Panetta told reporters here Jan.
01/17/2013 00: 36 (Pittsburgh Post-Gazette)
Several big U.S. banks, including Pittsburgh-based PNC Financial Services Group, have asked the federal government to take action to stop cyber attacks against their websites, according to a story Wednesday in the Wall Street Journal.
01/16/2013 23: 09 (The Norman Transcript)
Sooner or later, we all get that email that we don’t want, or receive something posted on our social network page that we wish we never got, and whether the message is from a company, an overzealous salesperson or from a personal acquaintance, they can be annoying and even upsetting at times.
01/16/2013 22: 31 (Equities.com)
Symantec Corporation NewsRx.com By a News Reporter-Staff News Editor at Electronics Newsweekly — A patent by the inventors McCorkendale, Bruce (Manhattan Beach, CA); Satish, Sourabh (Fremont, CA); Sobel, William E.
01/16/2013 19: 17 (Pendleton Times-Post)
We also have more stories about: (click the phrases to see a list) Subjects: Data privacy (9) Computer and data security (16) Technology issues (82) Government pensions and social security (96) Computing and information technology (153) Government-funded health insurance (322) Government programs
01/16/2013 19: 16 (ComputerWorld)
Moscow-based anti-malware firm Kaspersky Lab says it’s uncovered a years-long cyber-espionage campaign using phishing to target individuals in business, research and government offices mainly in Russia and Eastern Europe to steal sensitive data. This cyber-spy operation is also suspected to be run b
01/16/2013 18: 00 (Oxford Press)
A “definitive plan” is expected by late this week or early next week
01/16/2013 17: 32 (Isssource.com)
When the SCADA Security Scientific Symposium (S4) convenes in Miami every year, the security world expects to hear about how various systems, products or devices have huge gaping holes.
01/16/2013 14: 56 (WBTV 3 News)
CHARLOTTE, NC (WBTV) – The “bad guys” go where the action is. Your press release of a recent achievement, award, or expanding business catches their eye.
01/16/2013 05: 52 (Help Net Security)
Log analysis can reveal a lot of security mistakes and fails, but a lot of security sins, too. Take for example the incident recently shared by Verizon’s Risk Team: called in by a critical infrastructure company to investigate what seemed to be a breach of its networks by the hands of Chinese-based…
01/16/2013 00: 54 (Indiana Daily Student)
Phishers are targeting IU students, staff and faculty in what University Information Security officials called a “convincing-looking” email scam. The message, which uses the IU logo and correctly cites the name of University Information Technology Services, prompts recipients to follow a link to a
01/15/2013 22: 51 (WNCT)
GREENVILLE, N.C. (WNCT) – A fast food chain is dealing with a major security breach, and they’re warning you to keep an eye on your bank statement. Zaxby’s says if you’ve used a debit or credit card at some of its stores, hackers might have had access to your information.
01/15/2013 21: 54 (LocalNews8.com)
POCATELLO, Idaho – The United States Department of Homeland Security is urging people to be careful if they have they are running the computer programming script commonly known as Java.
01/15/2013 21: 41 (The Guardian)
Prime Minister Julia Gillard has called on social media giant Twitter to sign up to new guidelines for dealing with complaints on social networking sites.
01/15/2013 21: 41 (ComputerWorld Singapore)
The greatest challenge for today’s security infrastructure and methods of protection is advanced malware attacks. When having discussions with customers in 2012, Sourcefire A/NZ regional director, Chris Wood, said they were struggling to find effective protection against these threats “without over
01/15/2013 20: 40 (The Guardian)
A new cyber safety program will teach Australian middle-school students about cyberbullying, keeping passwords private and the dangers of posting embarrassing photos and videos online.
01/15/2013 20: 13 (NJ.com)
Cyber security will become an increasingly complex and costly part of doing business, but caution and preparedness is a better alternative than getting hacked or duped by cyber thieves, security experts said today at a conference on the problem.
01/15/2013 18: 10 (PhillyBurbs.com)
By Aaron Pressman BOSTON, Jan 15 (Reuters) – Lie about your identity on Facebook or delete files from your work laptop before you quit and you could run afoul of a 29-year-old U.
01/15/2013 18: 01 (GA Daily News)
How you search Facebook is about to change. In fact, just the act of searching Facebook is probably about to start. Facebook is trying to give Google a run for its money, with a new product called “Graph Search.
01/15/2013 17: 46 (Daily Journal Online)
Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of Homeland Security last week.
01/15/2013 16: 38 (Computerworld)
ICS-CERT recommends power plants adopt new USB practices
01/15/2013 16: 18 (TulsaCW.com)
/PRNewswire-USNewswire/ — The National Cyber Security Alliance (NCSA) and McAfee today released survey data in light of Annual Stalking Awareness Month indicating that 20 percent of Americans have been affected by cyberstalking, persistent emails, and other unwanted contact.
01/15/2013 13: 03 (Threat Post)
Up to a million Android users in China could be part of a large mobile botnet according to research unveiled by Kingsoft Security, a Hong Kong-based security company, this week.
01/15/2013 05: 31 (Equities.com)
Washington Al Bawaba Ltd. The US Department of Homeland Security warned that a security update of Oracle Corp’s Java software for Web browsers does not do enough to protect computers from attack, sticking to its previous advice that the program be disabled.
01/15/2013 05: 10 (Daily Record (AP))
LOS ANGELES (AP) – Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of Homeland Security last week.
01/15/2013 04: 17 (Help Net Security)
Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it also gives your clients confidence in your ability to secure their data.
01/15/2013 02: 55 (The Boston Globe)
Effort infiltrates geopolitical sites mainly inRussia
01/14/2013 21: 22 (Threat Post)
During the past three months, unnamed malware infected two power plants’ control systems using unprotected USB drives as an attack vector. At both companies, a lack of basic security controls made it much easier for the malicous code to reach critical networks.
01/14/2013 19: 34 (The Wall Street Journal)
The suicide of Internet activist Aaron Swartz has set off a round of questions about whether federal prosecutors are too aggressive in pursuing cases of computer crimes committed for idealistic reasons.
01/14/2013 16: 56 (Isssource.com)
Power, water, and nuclear systems in the U.S. are increasingly under attack by cybercriminals seeking to gain access to critical infrastructure. The number of attacks reported to the U.
01/14/2013 16: 56 (The Hill – Blog)
The White House and Pentagon have a “responsibility” to provide support to French forces looking to push out al Qaeda-linked militants out of northern Mali and ensure the terror group does not gain a foothold in western Africa, Defense Secretary Leon Panetta said Monday.
01/14/2013 11: 07 (Help Net Security)
Despite the fact that spam levels decreased by 53% in 2012 as compared to 2011, targeted spam and phishing attacks via e-mail are on the rise. Some of these campaigns consist of emails that are so effectively crafted that they could fool even some of the more advance users, while others look so obv
01/14/2013 09: 34 (Help Net Security)
Last year Microsoft’s Patch Tuesdays featured a total of 83 bulletins, which is a decline from previous years. Since their security efforts impact countless security professionals, we wanted to see what IT security leaders, and Microsoft, think about the patches released in 2012.
01/14/2013 09: 33 (Yahoo! Canada Finance)
01/14/2013 09: 01 (Equities.com)
M2 Communications ENP Newswire – 14 January 2013 Release date- 10012013 – Abingdon, UK – Kaspersky Lab, a leading developer of secure content and threat management solutions, has been named a ‘Leader’ in the Gartner Magic Quadrant for Endpoint Protection Platformsfor the second year in a row.
01/14/2013 05: 31 (Equities.com)
Boston Al Bawaba Ltd. Oracle Corp released an emergency update to its Java software for surfing the Web on Sunday, but security experts said the update fails to protect PCs from attack by hackers intent on committing cyber crimes.
01/14/2013 03: 47 (Equities.com)
IDG Reporter Al Bawaba Ltd. Cyberattacks on U.S. banks over the last several months reflect a frightening new era in cyberwarfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such attacks because of a shortage of experts skilled in building effecti
01/14/2013 03: 45 (FederalNewsRadio.com)
The Air Force is mapping out ways to cut out everything but the basics as it draws up plans for how it would handle sequestration. The across-the-board cuts now are scheduled to take place on March 1 after Congress instituted a two-month delay earlier this month as part of the partial agreement on
01/14/2013 03: 43 (ComputerWorld Singapore)
Google’s recent upgrade of Chrome has sparked a new round of bogus updates of the Web browser from cybercriminals hoping to steal online banking credentials and perform other mayhem.
01/14/2013 01: 55 (Help Net Security)
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as compared to 2011.
01/14/2013 00: 39 (The Boston Globe)
NEW YORK — Oracle fixed a security flaw in its Java software Sunday after the Department of Homeland Security warned computer users to disable the software completely, citing a loophole that allows hackers to take control of their machines.
01/13/2013 22: 33 (CJOnline.com)
Each year the Better Business Bureau reports on the previous year’s most damaging and prevalent scams so consumers can better recognize the tactics of fraudulent schemers.
01/13/2013 14: 19 (Examiner.com – Pennsylvania)
New threats to security are being introduced in cyberspace. The super highway has personal information copied from one network to another and data (and the threat of comprised data) is being exposed.
01/11/2013 12: 07 (Reuters Canada)
01/11/2013 10: 54 (WIS News 10)
COLUMBIA, SC (WIS) – By now, you or someone you know has probably received a text message congratulating you on winning a gift card to a major retailer.
01/11/2013 10: 07 (Threat Post)
Google patched nearly two dozen security vulnerabilities in Chrome on Thursday and a day later attackers have begun circulating fake Google Chrome updates that actually are part of a scam related to the Zeus botnet and is designed to stael online banking credentials, among other things.
01/11/2013 09: 38 (Help Net Security)
LinkedIn users are once again targeted with a massive and widespread spam campaign that takes the form of a notification about a supposedly received message from a potential new connection: Unfortunately, the offered links – although legitimate-looking – take users to compromised sites that either
01/10/2013 05: 46 (Help Net Security)
A new email spam campaign impersonating U.S. Airways is hitting inboxes, warns Webroot, and the airline’s customers would do well to be on the lookout for the following “booking confirmation” email (click on the screenshot to enlarge it): There are obvious spelling mistakes that should alert users
01/10/2013 03: 44 (Equities.com)
IDG Reporter Al Bawaba Ltd. Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.
01/10/2013 03: 01 (Help Net Security)
Recent research from Deloitte has highlighted that firms in technology, media and telecommunications are confident that they are safe from cyber attacks and data security breaches.
01/10/2013 02: 43 (Equities.com)
TOM BURTON City AM BRITAIN’s national security is in peril. According to a report released yesterday by the House of Commons Defence Select Committee, the threat to British IT systems from cyber attack is both rapidly evolving and increasingly significant.
01/10/2013 01: 48 (ComputerWorld Singapore)
U.S. banks and their customers are doing a better job of protecting themselves against cyberattacks that result in thieves taking over commercial accounts, according to a survey released by the Financial Services-Information Sharing and Analysis Center.
01/10/2013 01: 29 (Ashton Gazette)
(BPT) – Tax time is always tough. Whether you will owe or anticipate a refund, plan to do your own taxes or pay a professional to do them for you, preparing and filing your taxes can be a tedious task.
01/10/2013 01: 01 (Fort hood sentinel)
WASHINGTON – President Barack Obama signed the $633 billion fiscal 2013 National Defense Authorization Act into law Jan. 2. The legislation, which cleared Congress last month, authorizes the department to act in any number of instances.
01/09/2013 23: 39 (Alaska Dispatch)
The phalanx of cyberthreats aimed squarely at Americans’ livelihood became startlingly clear in 2012 – and appears poised to proliferate in 2013 and beyond as government officials, corporate leaders, security experts, and ordinary citizens scramble to devise protections from attackers in cyberspace.
01/09/2013 22: 27 (ComputerWorld Singapore)
A major cyber-attack on the UK could leave the UK’s armed forces “fatally compromised” without a viable ‘plan b’ a committee of MPs has warned the Government.
01/09/2013 22: 27 (ComputerWorld Singapore)
Cybercriminals will are turning their attention to mobile platforms, cloud computing, social media, critical and trust infrastructure and even big data, according to European Security Agency ENISA’s annual and now rather depressing summary of security industry opinion.
01/09/2013 22: 15 (Threat Post)
A hacker, or possibly group, that’s issued terrorists threats using remotely controlled computers in Japan remains at large despite a rare 3 million yen bounty and continuous games with media and police.
01/09/2013 17: 56 (Isssource.com)
Microsoft is facing a Zero Day with Internet Explorer and while they work to patch the issue, they developed a workaround. The problem is there is a workaround around the workaround.
01/09/2013 14: 52 (Isssource.com)
By Richard Sale U.S. intelligence officials today warned as nation-sponsored cyber warfare goes mainstream this year, attacks on U.S. installations and institutions could result not just in damage and theft but in fatalities.
01/09/2013 14: 18 (IT World Canada)
01/09/2013 05: 49 (Help Net Security)
This week, MPs on the Defence Select Committee have produced a report stating that the UK’s armed forces are now so dependent on IT that they could be ‘fatally compromised’ by cyber attacks.
01/09/2013 03: 44 (FederalNewsRadio.com)
Having been granted a brief reprieve from automatic budget cuts, Pentagon planners are crunching a new set of numbers. The deal Congress and the White House struck last week created a two month delay in the cuts that were due to take place on Jan.
01/09/2013 02: 13 (Equities.com)
ProQuest Information & Learning Microsoft announced that the U.S. Army, U.S. Air Force and Defense Information Systems Agency (DISA) are expanding access to Microsoft solutions by entering into a transformative three-year Joint Enterprise Licensing Agreement for enterprise licenses and software ass
01/09/2013 01: 53 (CNBC)
The attackers hit one American bank after the next. As in so many previous attacks, dozens of online banking sites slowed, hiccuped or ground to a halt before recovering several minutes later.
01/09/2013 01: 47 (ComputerWorld Singapore)
We’ve known for some time now that Firefox 18 would bring some significant speed improvements to Mozilla’s popular browser, and the final version-released today-made good on that promise officially.
01/09/2013 01: 27 (Claims Journal)
A Chinese national pleaded guilty Monday to conspiracy to commit criminal copyright infringement and wire fraud. The individual operated a website used to distribute more than $100 million worth of pirated software around the world, making it one of the most significant cases of copyright infringeme
01/08/2013 23: 07 (ComputerWorld)
Antivirus pioneer John McAfee spins tales of a Hezbollah plot to smuggle toxic powder into the U.S. that he uncovered when he spied on Belize officials in hopes of getting dirt on them in retaliation for their raiding his island home there, shooting his dog and stealing his stuff.