Amnesty International’s United Kingdom website was compromised late last week and was being used to exploit a known Java runtime environment hole on machines belonging to unwitting visitors to the site, according to Barracuda Labs researcher, Paul Royal.
Browsing Category: Social Engineering
Call it a new twist on Facebook “Like” jacking. Researchers at the firm Zscaler say that scammers are embedding Facebook “Like” widgets from top ranked Web brands and in Web pages used to promote online scams or distribute malware. The widgets make it appear as if tens- or hundreds of thousands of Facebook users ‘like’ the scam Web site.
VIEW SLIDESHOW Threatpost Top Security News Stories of 2011We’ve compiled our list of the Top Security Stories of 2011, presented here in no particular order. These are the issues that shook the world’s markets and kept us awake at night.
USAA is warning its members about a sophisticated phishing scam that attempts to install a malicious banking Trojan on members computers.
Investigations by the BBC suggest a widening probe into alleged computer hacking by UK newspapers. In all, the computer hacking may have been as widespread as now-notorious voicemail hacking conducted by reporters at Rupert Murdoch’s News of the World, and may have compromised classified British intelligence from government officials, the reports say.
Peddlers of ransomware are increasing their effectiveness by tailoring region-specific versions of a scam that impersonates local police.
The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk.
Be careful of what you ask for. That’s a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every piece of personal information that the world’s largest social network had collected on him.
Carrier IQ, the embattled software company at the center of the controversy over alleged data collection on mobile devices, has released a new document that details the ways in which carriers deploy the software, how it works on devices and what data it is capable of collecting. The company also admitted in the document that its software has a bug that, in some specific cases, could cause the application to collect the contents of SMS messages.
Pirates beware! The creator of a new Web based search engine says that linking you up with your (illegal) downloads is easier than you may think.