-
December 3, 2013
Scientist-developed malware covertly jumps air gaps using inaudible sound
Scientist-developed malware covertly jumps air gaps using inaudible sound: Computer scientists have developed malware that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could […]
-
December 3, 2013
Malware on hospital computer impacts thousands of Seattle patients
Malware on hospital computer impacts thousands of Seattle patients: A UW Medicine employee opened an email attachment and unknowingly downloaded malware, which led to the compromise of about 90,000 patients of Seattle-based Harborview Medical Center and University of Washington Medical Center. How many victims? About 90,000. What type of personal information? Names, addresses, phone numbers, […]
-
December 3, 2013
Targeted Attacks Spotted Exploiting Microsoft XP Zero
Targeted Attacks Spotted Exploiting Microsoft XP Zero: Researchers late last week discovered targeted attacks in the wild exploiting a previously unknown kernel vulnerability in Microsoft XP in what security experts say may be a sign of things to come as attackers home in on the older operating system, which Microsoft will no longer support as […]
-
December 3, 2013
Potentially Unwanted Programs secretly serve Bitcoin miner
Potentially Unwanted Programs secretly serve Bitcoin miner: The value of the Bitcoin for a few days has passed the psychological threshold of one thousand dollars, confirming its growth trend, the attention in the virtual currency scheme is at the highest levels and cybercriminals are exploiting new ways to monetize the unprecedented surge. Blackmarket is proposing […]
-
December 3, 2013
Information security must become an ‘enabler’ rather than a barrier
Information security must become an ‘enabler’ rather than a barrier: The latest information security survey published by the Department for Business, Innovation and Skills makes for frightening reading. It reveals that 93% of large organisations had a security breach last year, with the “joke” being made by many that the other 7% don’t yet know […]
-
December 3, 2013
UW Medicine alerts 90,000 patients on stolen data
UW Medicine alerts 90,000 patients on stolen data: UW Medicine has started notifying about 90,000 of its patients that medical information was stolen during a malware attack last month, including 15,000 cases in which Social Security numbers may have been taken. The attack happened when a UW Medicine employee opened an email attachment that contained […]
-
December 3, 2013
NSA Spying Risks $35 Billion in U.S. Technology Sales
NSA Spying Risks $35 Billion in U.S. Technology Sales: Disclosures of spying abroad may cost U.S. companies as much as $35 billion in lost revenue through 2016 because of doubts about the security of information on their systems, according to the Information Technology & Innovation Foundation, a policy research group in Washington whose board includes […]
-
December 3, 2013
LinkedIn – How to exploit social media for targeted attacks
LinkedIn – How to exploit social media for targeted attacks: The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described a typical attack scenario. Recently I read an interesting post published on the Websense security labs blog on the use of social network LinkedIn for the […]
-
December 2, 2013
White hat Wi-Fi hacking shows vulnerability of business data
White hat Wi-Fi hacking shows vulnerability of business data: White hat hackers have shown that usernames, passwords, contact lists, details of e-commerce accounts and banking details can be sniffed easily from public Wi-Fi hotspots.To illustrate one of the many ways people can have their data compromised, the white hat hackers from First Base Technologies conducted […]
-
November 29, 2013
Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases: It is difficult to underestimate popularity of Skype. Hundreds of millions of people use Skype every day, generating a lot of potential evidence. Recent versions of Skype are using SQLite databases to keep all history items. Chat logs, information about voice calls made and received, […]