[img_assist|nid=3404|title=|desc=|link=none|align=right|width=127|height=87]Rutgers University researchers have demonstrated how rootkits can be a threat to smartphones sporting operating systems not much unlike those in full-blown computers. Read the full article. [Network World]
Criminals hid bank card-skimming devices inside gas pumps — in at least one case, even completely replacing the front panel of a pump — in a recent wave of attacks that demonstrate a more sophisticated, insidious method of stealing money from unsuspecting victims filling up their gas tanks.
[img_assist|nid=3399|title=|desc=|link=none|align=right|width=100|height=100]Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign. Read the full article. [Help Net Security]
[img_assist|nid=3396|title=|desc=|link=none|align=left|width=100|height=100]A New Hampshire-based IT consultancy lost nearly $100,000 this month
after thieves broke into the company’s bank accounts with the help of
10 co-conspirators across the United States. Read the full article. [KrebsonSecruity]
Securosis analysts Rich Mogull, Adrian Lane and Mike Rothman tackle the key themes for this year’s RSA 2010 conference — virtualization/cloud security, advanced persistent threats/cybersecurity and compliance.
T[img_assist|nid=3395|title=|desc=|link=none|align=right|width=100|height=100]he Federal Trade Commission today finally voiced concern about the long-known problem of data leaking into criminal hands via LimeWire, BearShare, Kazaa and dozens of other peer-to-peer (p2p) file sharing networks. The FTC put nearly 100 companies and agencies on notice that their employees appear to be regularly leaking large amounts of sensitive customer and employee data on popular peer-to-peer, or P2P, file-sharing networks. Read the full story [The Last Watchdog]
[img_assist|nid=3380|title=|desc=|link=none|align=left|width=100|height=100]Researchers are preparing to release a free tool to stop
“drive-by” downloads: Internet attacks in which the mere act of
visiting a Web site results in the surreptitious installation of
malicious software. The new tool, called BLADE (Block All Drive-By
Download Exploits), stops downloads that are initiated without the
user’s consent. Read the full article. [Technology Review]
[img_assist|nid=3377|title=|desc=|link=none|align=right|width=100|height=100]Howard Schmidt has been involved in just about every aspect of the security industry during his career. After stints in the Air Force and at Microsoft, he served as a cybersecurity adviser to George W. Bush. Now, after heading back to the private sector for several years, he’s been appointed to serve as President Obama’s security adviser.
[img_assist|nid=3371|title=|desc=|link=none|align=left|width=100|height=100]Twitter users were hit by potent phishing attacks over the weekend that have already led to spam runs from compromised accounts. Read the full article. [The Register]
[img_assist|nid=3370|title=|desc=|link=none|align=right|width=100|height=100]Mainstream attention to Operation Aurora and the Kneber (Zeus) botnet are welcome. It underscores how the Internet underground has advanced to the point where a plethora of
powerful hacking tools and services is readily available to novice
hackers and elite crime gangs alike – with prices to fit every
budget. Read the full article. [The Last Watchdog]