Malicious Adware Uses Certificates to Disable Security Products
A piece of malicious adware dubbed “Vonteera” tricks the operating system into thinking that digital certificates from security companies are untrusted in an effort to prevent anti-malware products from blocking it. read more more…Security threats and why you never want to name anything
There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to market arguing that the name should have more to do with the benefit the technology provides and reflect that […] more…Cane uses facial recognition to steer the blind to friends and family
Students at Birmingham City University in England have created a cane that recognises familiar faces and vibrates to let its blind owner know that they’re near people they know. Incoming search termsSilong Teernitcom more…Security pros name their must-have tools
Secure file sharing is imperative for Lawyers Without Borders, a group that works with volunteer lawyers to advance human rights law in conflict-ridden regions. The nonprofit organization, headquartered in Hartford, Conn., uses Intralinks VIA to protect confidential legal documents and court papers from unsanctioned access. The SaaS solution for content sharing and collaboration is a […] more…Are metaverse pioneers making the same old security mistakes?
Ask security pros what they would change about the Internet if they could go back in time knowing what they know now, and most can point to a list of mistakes we could have avoided. But according to some experts, we’re still making the same mistakes today, with the development of the 3D virtual reality […] more…Why is ICANN rushing its ‘UN ‘net security council’? So it can be announced at Davos
Despite rejections from its closest allies and calls for delay, ICANN is determined to create a “coordination council” for its internet-steering NetMundial Initiative this month. Why? The initiative was born out of a meeting in April between some governments, ICANN, and others, in Brazil, to discuss the future direction of the web in the wake […] more…CUTWAIL Spambot Leads to UPATRE-DYRE Infection
A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in […] more…Website Security: A Case of SEO Poisoning
There are so many ways your website can be co-opted by hackers for many different reasons, targeting the value created via your SEO is highly attractive. It provides an attacker the opportunity to cheat the system by quickly benefiting from your raw traffic, your audience. In this post we will share details of a recent […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…Train security as critical as planes and automobiles
In recent weeks you’ve heard a lot of discussion around the cyber risks to aircraft and automobiles. After the Black Hat, DefCon and BSides conferences in Las Vegas, Nev., in July, it would seem that a great deal of necessary attention will be paid to the security of design and implementation of these two key […] more…Being Secure In The Most Connected World Cup Ever
Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Brazilian telecom provider Oi made sure that no expense was spared in ‘connecting’ the World Cup , and even claimed that this year’s event is in fact the most connected in the history of the World Cup. Oi claims that they […] more…Securing the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let me explain. When a company creates a smart device, they not only need to create the hardware for […] more…Wi-Fi security and fake ac/dc charges threaten your data at the 2014 World Cup
When we’re traveling we tend to bring lots of smart devices with us. It’s great to be able to share a beautiful photo, let people know where you are or put your latest news on Twitter or Facebook. It’s also a good way to find info about restaurants, hotels and transport connections. But to do […] more…22-year-old "organized crime" cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…22-year-old “organized crime” cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…Need your Mt. Gox bitcoins back? Steer clear of this website
Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted in a ploy likely intended to distributed malware. read more more…More information
- Resolved: Multiple Services Degredation
- Central Person Registry (CPR) Software Update
- Want to get rich from bug bounties? You’re better off exterminating roaches for a living
- Skype instant messaging in China is censored, spied upon
- Pivotal RabbitMQ CVE-2019-11287 Remote Denial of Service Vulnerability
- P2Pinfect Worm Now Dropping Ransomware on Redis Servers
- Karamba Security Emerges From Stealth to Protect Cars From Hackers
- Spy tech exports from Europe face tighter scrutiny
- QR codes need security revamp, says creator
- How emails can be used to track your location and how to stop it