[img_assist|nid=2588|title=|desc=|link=none|align=left|width=100|height=100]A phisher hoping to harvest bank login details managed to smuggle his app onto the Android app store. Malicious apps posted by Droid09 were quickly identified, prompting a warning to legitimate users and a ban for the VXer. Read the full article. [The Register]
Browsing Category: Malware
[img_assist|nid=2587|title=|desc=|link=none|align=right|width=100|height=100]Proof of concept exploit code was posted by a security researcher demonstrating a
vulnerability in versions 10.5 and 10.6 of Apple’s Mac OS X operating
system. Read the full article. [Dark Reading]
[img_assist|nid=2584|title=|desc=|link=none|align=left|width=100|height=100]By Dmitry Bestuzhev As any reader of this site knows, cybercriminals can steal your money not just by putting malware on your machine, but by phishing attacks too. Phishing attacks don’t just target online banking and e-payment systems, but almost any site which asks the user to input sensitive data.
[img_assist|nid=2580|title=|desc=|link=none|align=left|width=152|height=52]Heartland Payment Systems on Jan. 8 announced that it has agreed to pay up to $60 million to Visa to cover losses to credit and debit cardholders affected by the massive data breach Heartland suffered in 2008. Read the full article. [eWEEK]
[img_assist|nid=2565|title=|desc=|link=none|align=left|width=100|height=100]Here, in chronological order, are the top 10 security and privacy
stories concerning Facebook and Twitter from the past year. Read the full article. [Network World]
A financial services industry group is
planning to simulate a series of cyber attacks to test how well banks,
payment processors and retailers deal with online threats. Participants will be expected to activate their incident response
procedures in accordance with the scenario presented and to complete an
anonymous survey to evaluate their organization’s response. Read the full story [Dark Reading]
[img_assist|nid=2547|title=|desc=|link=none|align=right|width=100|height=100]In an advisory sent Wednesday afternoon, Juniper said a
variety of devices could be forced to reboot by sending them internet
packets with maliciously formed TCP options. Read the full article. [The Register]
By Andrew Storms[img_assist|nid=2543|title=|desc=|link=none|align=left|width=100|height=100]The year was 2001. Code Red, the Microsoft Web Server worm was running rampant and underscored every security professional’s perception that Microsoft products were both a necessary evil and a serious security liability.
Fast-forward to nine years later. Microsoft products still contain more than a few nasty bugs, but the company is more likely to be considered a valued partner than a security liability by the security community.
[img_assist|nid=2539|title=|desc=|link=none|align=right|width=100|height=100]In an undercover mission to learn more about
the size and scope of the son of the infamous Storm botnet, Waledac,
German researchers have discovered the spamming botnet is much bigger
and more efficient than previously thought. Read the full article. [Dark Reading]
[img_assist|nid=2477|title=|desc=|link=none|align=left|width=100|height=100]Instead of the usual top ten lists that are all-too-common with predictions for the new year, I have just one: 2010 will be the year of desktop applications handling untrusted data in sandboxed processes, and it will be about time.