[img_assist|nid=2170|title=|desc=|link=none|align=left|width=100|height=100]Researchers expect Conficker to get worse in the coming year in a number of specific ways including the corruption on defensive systems, keylogging, DDoS, mass identity theft, and more. Read the full article. [Help Net Security]
Browsing Category: Social Engineering
[img_assist|nid=2149|title=|desc=|link=none|align=left|width=100|height=100]U-Test has just completed a substantive, independent review of three major e-tailing sites–Amazon, Walmart and Target– and found a gaping cross-site scripting security hole in one of them. Read the full article. [The Last Watchdog]
[img_assist|nid=2147|title=|desc=|link=none|align=right|width=100|height=100]The websites of NASA’s Instrument Systems and Technology unit and
Software Engineering division were broken into by taking advantage of SQL Injection flaws and poor access controls. Read the full article. [The Register]
[img_assist|nid=2138|title=|desc=|link=none|align=right|width=100|height=100]Scam e-mail artists have launched a massive campaign to trick
webmasters into giving up the credentials needed to administer their
Web sites, targeting site owners at more than 90 online hosting
providers. Read the full article. [Washington Post]
[img_assist|nid=2112|title=|desc=|link=none|align=right|width=100|height=100]The Defense Department will not meet its end-of-the-year deadline for
removing Social Security numbers from military ID cards as they are issued or
renewed, the Pentagon has confirmed. Read the full article. [Stars & Stripes]
[img_assist|nid=2103|title=|desc=|link=none|align=left|width=100|height=100]Two Bulgarians have been sentenced for their roles in an online
money-laundering scheme that collected about $1.2 million from U.S.
residents and sent it to a criminal group in Eastern Europe, the U.S.
Department of Justice said. Read the full article. [Computerworld]
[img_assist|nid=2105|title=|desc=|link=none|align=right|width=100|height=100]Although the combined number of reported data breaches in the
government and the military has dropped in 2009 compared to last year,
many more records were compromised in those breaches, according to
recent figures compiled by the Identity Theft Resource Center. Read the full article. [Government Technology]
[img_assist|nid=2079|title=|desc=|link=none|align=left|width=129|height=44]A Cyber Forensics panel at the U.S Spy Museum discussed data breaches and the effects one bad hacking event can have; The panel discussion included the CEO of Heartland Payment Systems, whose company was the victim of a very large, very publicized data breach in 2008. Read the full article. [Dark Reading]
[img_assist|nid=2075|title=|desc=|link=none|align=left|width=100|height=100]Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more. But as privacy concerns mount and users demand more protection, the social networking site’s philosophy has started to go down the toilet. Now that Facebook is eliminating regional networks — or groupings of people based on where they live — it’s becoming apparent that proclivities lean towards building fences rather than crossing them. Read the full story [PCWorld]. Also see: How to protect your privacy on Facebook and Twitter.
[img_assist|nid=2070|title=|desc=|link=none|align=right|width=100|height=100]Malware attacks and infections are up 50 percent from 2008 and losses are down, according to a Computer Security Institute report, but the industry organization says very few companies are willing to disclose dollar amounts. Read the full article. [Security Focus]