This Google Tech Talk features Dr. Alan Karp of HP Labs, who details the company’s Virus Safe Computing Initiative.
Browsing Category: Web Security
The Conficker botnet has started to use its peer-to-peer communication system to update itself and download scareware (fake anti-virus programs) to millions of infected Windows machines, according to malware hunters tracking the threat.
The latest Conficker mutant comes a week after a heavily-hyped April 1st activation date and provides the first sign of the motivation behind this malware threat — financially motivated cybercrime.
In this Google Tech Talk, Mike Andrews, a security consultant from Foundstone, discusses common techniques for exploiting weak spots in Web applications. (Running time: 1:26)
Malware that attacks mobile phones and other handheld devices has been the Next Big Threat for most of the last decade. And much like the Year of PKI, it’s never really materialized. Security experts have postulated that this is mainly because there’s not enough valuable data on these devices to attract the money-motivated attackers. But a new paper, “Understanding the Spreading Patterns of Mobile Phone Viruses,” from a group of scientists shows that the barriers are more likely market saturation and geography.
Dennis Fisher t[img_assist|nid=2479|title=|desc=|link=none|align=right|width=100|height=100]alks to Adam Shostack of Microsoft, about the evolution of thinking around “The New School of Information Security,” his new group blog and what surprised him most when he went to work at Microsoft.
From The Register (Dan Goodin)
Overlooked design weaknesses in a widely used type of wireless network are seriously jeopardizing the network security of the retailers and manufacturers [theregister.co.uk] that rely on them, a security expert has determined.
So-called FHSS, or frequency-hopping spread spectrum, networks are an early form of the 802.11 wireless data standard. Although transmission speeds, at about 2 Mbps, lag far behind more recent 802.11 technologies, they remain widely used by many Fortune 1000 companies, particularly those with large warehouses or factory floors. Read the full story [theregister.co.uk]
Security researchers at Kaspersky Lab (our corporate sponsor) are warning about a new potentially unwanted program [viruslist.com] targeting Symbian-based smart phones.
The program, called iPornPlayer (screenshot at right), promises sexually-explicit content on handsets but there’s a hefty price attached because it calls international premium rate numbers.
Read the full story [viruslist.com]
Dennis Fisher talks wi[img_assist|nid=2486|title=|desc=|link=none|align=right|width=100|height=100]th Rich Mogull, founder of Securosis, about the behind-the-scenes effort by the Honeynet Project and others to identify Conficker-infected PCs, as well as the hype surrounding the DLP market and the level of DLP adoption.
The FBI’s Internet Crime Complaint Center (IC3) says complaints of online crime hit a record high in 2008, driven mostly by non-delivery of goods and service and those pesky 419 (Nigerian) e-mail scams.
Accordign to a new report (PDF from ic3.gov), the center received a a total of 275,284 complaints, a 33.1% increase over the previous year. The total dollar loss linked to online fraud was $265 million, about $25 million more than in 2007. The average individual loss amounted to $931. Other significant findings include:
From DarkReading (Kelly Jackson Higgins)
Another reason to be careful what you post on Facebook: All it takes is a simple Google search, and phishers and marketers can glean a treasure trove of private information [darkreading.com] based on relationships among Facebook “friends,” according to new research.
Researchers from the U.K.’s University of Cambridge recently published a paper [PDF frm cam.ac.uk] detailing a project in which they developed a software tool to correlate and map Facebook profiles they found via public search engines, such as Google, to build detailed maps of relationships among Facebook members. Read the full story [darkreading.com]