Ubuntu Touch Preview coming to Nexus tablets this week
After desktops and phones, Ubuntu is now bringing its Linux distribution to tablets. Coming Thursday, preview images for Google’s Nexus tablets will be released, so we can all get a good long look at what Canonical is cooking up. They’ve published a YouTube video which details all that Ubuntu has to offer for tablets, and […] more…The cyber war is real — and our defenses are weak
I used to think “cyber war” was the most overhyped security buzzphrase of all time. And it was — until Stuxnet and APTs (advanced persistent threats) arrived. Now, as Bob Violino detailed in his recent InfoWorld article, all-out cyber war has begun. Tags: Security more…Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
The BYOD phenomenon is old news, with support from most companies. For IT organizations, that means ensuring proper security and management over the mobile devices employees are likely to use. In the last year, Apple’s iPhone and iPad have become the new corporate standards due to high user satisfaction and superior security capabilities. Tags: Security […] more…Apple One of the "Other Companies" Hacked
Wow. According to Reuters, Apple was one of the “other companies” recently attacked by hackers who infected Macs. Hundreds of companies, including defense contractors, are affected according to Reuters. And according to AllThingsD, a site called iPhoneDevSDK is the likely watering hole where the attack took place. Here’s the geographic stats from DomainTools. Apple will […] more…Facebook Confirmed: Several Other Companies Hacked
Yesterday’s post generated some feedback along the lines of “interesting theory”. But here’s the deal, that other companies were hacked is not a theory — it’s a fact. Facebook’s Chief Security Officer, Joe Sullivan, said so himself in an interview with Ars Technica. According to Sullivan, Facebook’s security team worked with a third-party to sinkhole […] more…New material interface improves functioning of non-silicon-based electronic devices
For the first time, researchers have designed a special material interface that has been shown to add to and to improve the functioning of non-silicon-based electronic devices, such as those used in certain kinds of random access memory. The new method could be used to design improved, more-efficient, multilevel and multifunctional devices, as well as […] more…Sneaky Joomla Web Malware – JavaScript Infections
So the past week has been interesting, we have been having fun with a few JavaScript infections that really forced us to put on our thinking hats. Our Senior Malware Engineer, Fioravante Cavallari, actually found the payload and dissected it – thank goodness for products based on human-intelligence. It was so interesting that we felt […] more…Apple’s own Macs bitten by Java-based malware attack
Apple released a statement today acknowledging that they were victims of the same attackers that Facebook talked about last week. A zero-day Java vulnerability infected Apple Mac developers through a drive-by attack. more…Why You Should Read the ISACA APT Study Before the Mandiant Report?
It’s another big information security story day at the New York Times. Three weeks ago after their big story detailing the Advanced Persistent Threats (APT) attack against their network, today they have a story detailing the ongoing espionage and corporate espionage against companies and organizations around the world. It’s a very interesting and very detailed […] more…Apple hit by same hackers who targeted Facebook last week
Apple Inc computers were attacked by the same hackers who targeted Facebook Inc, but no data appeared to have been stolen, the company said on Tuesday in an unprecedented admission of a widespread cyber-security breach. Facebook revealed on Friday that unidentified hackers traced to China had staged a sophisticated attack by infiltrating its employees’ laptops, […] more…Apple Support Gives Hacker Access to Blogger’s iCloud
As we become more connected and more reliant on the web, top-notch security becomes more and more important. While some services like Gmail offer two-step verification to ensure only you can access your account, not every service offers security that’s as air-tight. This past weekend, Wired’s Mat Honan revealed that he had been hacked. Actually, […] more…Watch a Chinese military hacker launch a successful attack
Thanks to cybersecurity firm Mandiant, we now have a video of a hacker believed to be linked to the Chinese military infiltrating and stealing files from unidentified English language targets. The video comes as part of Mandiant’s 60-page report, first reported by the New York Times, that claims China’s military is responsible for cyberattacks on […] more…British music industry bids to block three more file-sharing sites
The British Phonographic Industry (BPI) is seeking to block file-sharing sites Fenopy, H33t and Kickass Torrents, the BPI said on Tuesday. “We are seeking court orders requiring ISPs to block access to three infringing websites,” said BPI Director of Communications, Adam Liversage, in an email. The BPI wants the U.K. ISPs BT, Sky, Virgin Media, […] more…"Police raided me" says leaker who tried selling next-gen Xbox dev kit
Leaking information and materials regarding upcoming consoles is serious business. Just ask SuperDaE, the anonymous source whose parceling of information and attempted sale of his supposed Microsoft “Durango” development kit has purportedly earned him a visit from police and an FBI agent. The mysteriously well-informed source posted on Twitter this morning that “police raided me,” […] more…12 Networking Tips for Shy and Anti-Social IT Pros
If you’re a naturally introverted person, getting close and sharing with people can feel unnatural and difficult, but it’s not impossible. The first thing you have to realize is that you are not alone. Many of your peers, celebrities, dignitaries and people from all walks of life are introverts and yet they manage to overcome […] more…LogMeIn uncloaks cloud storage bypass
By now you know the prosumer cloud storage schtick: an agent on your device monitors a designated folder and copies everything in it to the cloud, from where any other device running the service’s agent and logged in with the same account sucks down that file so it is available locally. Tags: cloud LogmeIn Security more…More information
- Ransomware isn’t all it’s cracked up to be
- Recorded Future Adds Third-Party Risk to Threat Intelligence Platform
- High Severity Flaws Patched in Rockwell Automation Tools
- BlackCat Strikes Back: Ransomware Gang “Unseizes” Website, Vows No Limits on Targets
- Microsoft to patch dangerous Outlook hack-by-preview bug next week
- Display Software Flaw Affects Millions of Devices
- Australian teen accepts police caution to avoid hacking charge
- Microsoft Internet Explorer CVE-2015-2444 Remote Memory Corruption Vulnerability
- China-Linked Group Uses New Malware in Japan Attacks
- German consumer groups sue WhatsApp over privacy policy changes