[img_assist|nid=3048|title=|desc=|link=none|align=left|width=100|height=100]Twitter revealed more details about the phishing attacks that caused the company to reset the passwords on some user accounts Feb. 2. Read the full article. [eWEEK]
Browsing Tag: malware
[img_assist|nid=3002|title=|desc=|link=none|align=left|width=81|height=137]More than 300 Web sites are being pestered by infected computers that are part of the Pushdo botnet, according to security researchers. Read the full article. [Security Central]
[img_assist|nid=2993|title=|desc=|link=none|align=right|width=100|height=100]Google may have threatened to leave China in order to keep us all from concluding that “the cloud” can’t be secured. But isn’t that precisely what we should conclude based on the fact that Google chose to leave China? Read the full article. [Computerworld]
[img_assist|nid=2994|title=|desc=|link=none|align=right|width=100|height=100]MOSCOW — Attackers have been focusing a lot of attention on social networking destinations such as Facebook, Twitter and even LinkedIn for some time now, but they recently have begun shifting their tactics to make their attacks much more effective and precise through the use of geolocation and profiling.
[img_assist|nid=2978|title=|desc=|link=none|align=left|width=100|height=100]According to researchers, cybercriminals are trying to
sell hacked Twitter user names and passwords online for hundreds of
dollars and as much as $1000. Read the full article. [Computerworld]
[img_assist|nid=2977|title=|desc=|link=none|align=right|width=100|height=100]The recently released APWG Phishing Activity Trends Report for Q3 of 2009, details record highs in multiple phishing vectors, but also offers an interesting observation on desktop crimeware infections. Read the full article. [ZDNet]
[img_assist|nid=2979|title=|desc=|link=none|align=left|width=100|height=100]A vast majority of voice encryption products are seriously flawed, according to controversial tests by an anonymous hacker.
Using the commercially available FlexiSpy wiretapping utility and a
‘homemade’ Trojan, Notrax (the anonymous hacker’s nickname) claims to
have defeated 11 out of 15 voice encryption technologies in tests. Read the full article. [The Register]
By Gunter Ollmann, Damballa[img_assist|nid=2970|title=|desc=|link=none|align=left|width=100|height=100]The recent Google Advanced Persistent Threat (APT) dialogue has been
hogging the press for a week now, and each day reveals new (and often
conflicting) insight. As I mentioned on Thursdays blog – “Preemptive Protection” Isn’t – If You’re Battling APT’s
– this particular attack doesn’t represent some new shift in tactics.
It’s not the first APT in the world, in fact I’m pretty sure it’s not
Google’s first exposure to APT’s, and I’m certain it isn’t going to the
last. In fact I’d say its a safe bet to say that there are several
other equivalent APT successes currently operating within Google’s
networks waiting to be discovered. Such is the state of the threat.
A survey of 600 computing and computer-security executives in 14
countries suggests that attacks on the Internet pose a growing threat
to the energy and communication systems that underlie modern society. Read the full article [New York Times].
[img_assist|nid=2951|title=|desc=|link=none|align=left|width=100|height=100]More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware by researchers. Read the full article. [Help Net Security]