Computer users are getting infected with ransomware because criminals have managed to hack the DNS records of Go Daddy hosted websites.
Read more:
http://nakedsecurity.sophos.com/2012/11/23/hacked-go-daddy-ransomware/
Your new post is loading...
Your new post is loading...
Computer users are getting infected with ransomware because criminals have managed to hack the DNS records of Go Daddy hosted websites.
Read more: http://nakedsecurity.sophos.com/2012/11/23/hacked-go-daddy-ransomware/
No comment yet.
Sign up to comment
An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets. Honeypots are powerful tools that can be used to achieve this goal. This document is the final report of the ‘Proactive Detection of Security Incidents: Honeypots’ study.
Publication date: Nov 22, 2012
Pick of the bunch in the information security space...
A MUST read: http://www.v3.co.uk/v3-uk/news/2097638/security-experts-follow-twitter
Eugene Kaspersky calls for more regulation online to fight against cybercrime and cyberweapons.
Read more, a MUST: http://mashable.com/2012/11/20/kaspersky-online-regulation/
Berlin Police published a press report warning of fraudulent actions that involve scammers using mobile transaction authentication numbers or mTAN sent via SMS...
Read more, a MUST:
The FBI's top man, Robert S. Mueller III, tackles the internet age. The web has changed the way we learn, work and communicate. But with that convenience we have compromised our security, and widespread use has also left us vulnerable to attack from hostile foreign powers, hackers, spies - and even terrorists.
A site on Anonymous' target list defaced by a pro-Palestinian group.
===> “November 2012 will be a month to remember for the Israeli defense forces and internet security forces. Israeli Gov. this is/will turn into a cyberwar.” <===
Read more:
Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order to hide the malicious traffic...
Read more, a MUST:
FreeBSD has announced a smallish system compromise.
OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
Compatible with Windows XP, Vista, 7 and 8
Read more, a MUST: http://www.opswat.com/products/security-score
When the Israel Defense Forces (IDF) this week began taking military action in the Gaza strip against Hamas (as the IDF announced on Twitter), Anonymous declared its own war as part of #OpIsrael. Among the casualties are thousands of email addresses and passwords, hundreds of Israeli Web sites, government-owned as well as privately owned pages, as well as databases belonging to Bank Jerusalem and the Ministry of Foreign Affairs.
Read more, a MUST:
NASA plans to implement full disk encryption on laptops after a security breach affected thousands of employees and contractors in the US, according to Infoworl... Via Frederic GOUTH
A stolen laptop belonging to Nasa contained sensitive personal information on employees and contractors, the space agency has confirmed.
===========================================
Gust MEES
Must be really difficult to learn the basics of Cyber-Security for NASA! Already in 2008 a worm has infected machines on the International Space Station due to an infected USB flash drive :( Naivety is the worst enemy for Cyber-Security!
Read also:
- http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/
- http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/
===========================================
Read more: http://www.scmagazineuk.com/stolen-nasa-laptop-contained-sensitive-staff-information/article/268422/
|
If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing.
=============================================
Gust MEES
Read alos my FREE courses "Naivatey in the Digital Age!?" here:
- http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/
=============================================
Read more, a MUST: http://www.net-security.org/malware_news.php?id=2329&utm_source=dlvr.it&utm_medium=twitter
Prince William gets photographed doing his day job - unfortunately, someone didn't spot the password pinned to the wall behind him..
============================================
Gust MEES
Read also "Naivety in the digital age!?
- http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/
============================================
Full story here:
A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.
In the case of USB smart card readers, the attacker can use the middleware software provided by the smart card manufacturer to perform operations with the victim's card as if it was attached to his own computer, said Paul Rascagneres, an IT security consultant at Luxembourg-based security auditing and consulting firm Itrust Consulting, last week. Rascagneres is also the founder and leader of a malware analysis and engineering project called malware.lu, whose team designed this USB sharing malware.
There are already documented cases of malware that hijacks smart card devices on the local computer and uses them through the API (application programming interface) provided by the manufacturer.
Read more, a MUST: http://www.pcworld.com/article/2014713/security-team-finds-malware-that-hijacks-usb-smart-cards.html
The Linux root kit targets 64-bit Linux platforms and uses advanced techniques to hide itself, and infects the websites hosted on attacked HTTP server working to launch drive-by download attacks.
“It's an outstanding sample, not only because it targets 64-bit Linux platforms and uses advanced techniques to hide itself, but primarily because of the unusual functionality of infecting the websites hosted on attacked HTTP server - and therefore working as a part of drive-by download scenario,” commented Marta Janus, a Kaspersky Lab Expert who examined the rootkit sample.
===> “This rootkit, though it's still in the development stage, shows a new approach to the drive-by download schema and we can certainly expect more such malware in the future.” <===
Read more: http://www.securityweek.com/linux-rootkit-found-launching-iframe-injection-attacks
What is Cybersecurity?
Nazli Choucri
Gihan Daw Elbait
Stuart Madnick
Download:
The FreeBSD project has suffered a security breach which could cause a mess for the Unix based operating system.Hackers have successfully compromised servers that were part of the infrastructure used to build third-party software packages.
===> They are warning users that there is no guarantee about the integrity of packages available for installation between 19 September and 11 November. <===
Read more:
More than half of U.S.Department of Energy desktop systems failed to apply security patches for known vulnerabilities, though the software fixes were issued months...
Read more: http://www.govinfosecurity.com/energy-fails-to-patch-vulnerable-pc-apps-a-5301
Is your computer configured properly for maximum security? Are there things you could do to lock it down more tightly? OPSWAT's new, free Security Score utility will scan the system and let you know about any areas that could use improvement.
By dealing with problem areas you can raise your security score and likewise raise your system's overall security. Everyone should download this tool and give it a try!
Read more, a MUST: http://securitywatch.pcmag.com/none/305013-what-s-your-security-score
According to XSSed, Shubham Upadhyay has discovered an active XSS flaw affecting Ebay.com.
Read more, a MUST: http://www.zdnet.com/active-xss-flaw-discovered-on-ebay-7000007539/
by Michael Horowitz ===> August 27, 2008 10:41 PM PDT <===
A worm has infected machines on the International Space Station. But a few simple precautions likely could have prevented it. Read this article by Michael Horowitz on CNET News.
===========================================
Gust MEES
It's already an OLD article, but still a good "bad example" to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers!
Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!
But this not yet enough, NASA didn't learn anything from it! Check: Stolen NASA laptop contained sensitive staff information
- http://www.scoop.it/t/securite-pc-et-internet?tag=Stolen+NASA+Laptop
===========================================
Read more: http://news.cnet.com/8301-13554_3-10027754-33.html
|
Your new post is loading...