[img_assist|nid=4488|title=|desc=|link=none|align=right|width=100|height=100]A new version of the data-stealing trojan Zeus is for the first time able to successfully exploit Mozilla’s Firefox browser to commit sophisticated online banking fraud. Read the full article. [Secure Computing]
[img_assist|nid=4487|title=|desc=|link=none|align=left|width=100|height=100]How many botnets are there? Symantec says 6.8 million, but a former Symantec executive at Immunet and a key creator of the Internet Security Threat Report says his former company is off by several magnitudes of order. Gunter Ollmann of Damballa concurs with Immunet and puts the numbers between 19 and 24 million. Read the full article. [The Last Watchdog]
[img_assist|nid=4478|title=|desc=|link=none|align=right|width=100|height=100]BOSTON — A prominent security consultant is urging a rethink of the way businesses handle user education and awareness, warning that the way attackers have latched on to social engineering techniques makes it difficult to cope with hacker attacks.
[img_assist|nid=4475|title=|desc=|link=none|align=left|width=100|height=100]One of the most common complaints I hear from information security
executives in large organizations is that they are constantly playing
defense, not offense. Their network security apparatus is designed to
wait for an attack, see if it’s successful and, if it is, to plug the
hole, then repeat.
Less than 10% of the top 300 most highly trafficked sites are protected using a registry lock service. Why is that? MarkMonitor attempts to answer that in a Q&A. Read the full article. [ZDNet]
[img_assist|nid=4420|title=|desc=|link=none|align=left|width=100|height=100]According to research, the malicious iframe used in the latest Network Solutions attack pointed to corpadsinc.com which then downloads Adobe exploits onto victims’ machines. The hacks raise an issue increasingly being faced by Website owners: what’s the responsibility of the ISP or service or cloud provider to provide more application-layer security?
[img_assist|nid=4466|title=|desc=|link=none|align=right|width=100|height=100]A pair of security researchers has discovered a number of new attack vectors that give them the ability to not only locate any GSM mobile handset anywhere in the world, but also find the name of the subscriber associated with virtually any cellular phone number, raising serious privacy and security concerns for customers of all of the major mobile providers.
[img_assist|nid=4465|title=|desc=|link=none|align=left|width=100|height=100]Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages. The problem started about a week ago but seems to have escalated over the past few days. Read the full article. [IDG News Service]
CBS News broadcaster Armen Keteyian reports that the advanced technology added to
the good, old-fashioned copy machine has opened a dangerous hole in data