[img_assist|nid=2662|title=|desc=|link=none|align=left|width=100|height=100]The attack that compromised Google’s corporate network and the systems of more than 30 other companies in recent weeks appears to be the work of smart, careful and very well-informed attackers who knew exactly whom to target and what to take once they were inside, security experts say.
Browsing Tag: malware
[img_assist|nid=2597|title=|desc=|link=none|align=right|width=100|height=100]In the world of botnets and denial-of-service attacks, 2009 was a very interesting year. While a handful of large, noisy botnets got most of the attention, there were thousands of serious, prolonged DDoS attacks that not only chewed up huge amounts of bandwidth but likely caused major problems for the targeted organizations.
[img_assist|nid=2593|title=|desc=|link=none|align=left|width=100|height=100]A false rumor suggesting that Facebook is to start charging is being used to bait malware traps.Thousands of disgruntled users, angry at the false claims that a $4.99 a month charge
for using the social networking site that will supposedly kick in have been induced to
visit “protest group” sites in response to spam emails. Read the full article. [The Register]
[img_assist|nid=2565|title=|desc=|link=none|align=left|width=100|height=100]Here, in chronological order, are the top 10 security and privacy
stories concerning Facebook and Twitter from the past year. Read the full article. [Network World]
[img_assist|nid=2547|title=|desc=|link=none|align=right|width=100|height=100]In an advisory sent Wednesday afternoon, Juniper said a
variety of devices could be forced to reboot by sending them internet
packets with maliciously formed TCP options. Read the full article. [The Register]
[img_assist|nid=2531|title=|desc=|link=none|align=left|width=100|height=100]Banks, military contractors and software companies, along with federal
agencies, are looking for “cyber ninjas” to fend off a sophisticated
array of hackers, from criminals stealing credit card numbers to
potential military adversaries. Read the full article. [NY Times]
[img_assist|nid=2521|title=|desc=|link=none|align=left|width=100|height=100]The security researcher who created the MySpace XSS worm in 2005 has developed a technique that enables an attacker to accurately locate a Web user with GPS coordinates, without using IP-based geolocation.
The American Bankers Association and the FBI are advising small and
midsize businesses that conduct financial transactions over the
Internet to dedicate a separate PC used exclusively for online banking as they ahve become targets of banking malware. Read the full article. [The Last Watchdog]
Threatpost editor Dennis Fisher talks about the implications of Howard Schmidt’s appointment, the story of the year in 2009 and what 2010 might bring for security.
[img_assist|nid=2423|title=|desc=|link=none|align=right|width=100|height=100]Microsoft is investigating reports of a new zero-day vulnerability in its IIS Web server software, and says that the flaw is a problem mainly on servers that are poorly configured.