-
November 28, 2013
Analyzing Malicious PDFs
Analyzing Malicious PDFs: PDF files have become very common in everyday work. It’s hard to imagine business proposals without PDFs. The PDF format is used in almost all companies to share business deals, company brochures, and even invitations. Previous years were not good for PDF users, as several vulnerabilities were published, such as buffer overflow […]
-
November 28, 2013
China’s new security superagency to further centralise power in Xi’s hands
China’s new security superagency to further centralise power in Xi’s hands: The security panel set up by the Communist Party earlier this month bears a similar name to two very different foreign agencies: the US National Security Council (NSC) and the now defunct KGB, whose Russian name translates to the Committee for State Security. The […]
-
November 27, 2013
Repeated attacks hijack huge chunks of Internet traffic, researchers warn
Repeated attacks hijack huge chunks of Internet traffic, researchers warn: Huge chunks of Internet traffic belonging to financial institutions, government agencies, and network service providers have repeatedly been diverted to distant locations under unexplained circumstances that are stoking suspicions the traffic may be surreptitiously monitored or modified before being passed along to its final destination. […]
-
November 27, 2013
Cryptolocker shrinks ransom as Bitcoin bubble grows
Cryptolocker shrinks ransom as Bitcoin bubble grows: New versions of the malware have been shown by anti-virus firm F-Secure as having a lower ransom demand than previously. The relatively new breed of malware known as “ransomware” works by encrypting files on an infected computer and issuing a demand for payment in Bitcoins to unencrypt them […]
-
November 27, 2013
Stuxnet worm analyzed as world’s first true cyber
Stuxnet worm analyzed as world’s first true cyber: Stuxnet’s creators recognized they had built the world’s first true cyber-weapon and were more interested in pushing the envelope of this new type of digital warfare than causing large-scale destruction within targeted Iranian nuclear facilities, a study shows. In an analysis released last week, Ralph Langner, head […]
-
November 27, 2013
1-15 November 2013 Cyber Attacks Timeline
1-15 November 2013 Cyber Attacks Timeline: It’s time for the summary of the main cyber attacks occurred in the first half of November and reported on the news. These fifteen days have been particularly troubled from an information security perspective, having left to the records several remarkable breaches: LoyaltyBuild, affecting potentially 1.12 million individuals, CorporateCarOnline.com […]
-
November 27, 2013
Photojournalist gets $1.2 million in damages for images cribbed from Twitter
Photojournalist gets $1.2 million in damages for images cribbed from Twitter: A jury awarded photojournalist Daniel Morel $1.2 million on Friday afternoon, to be paid by defendants Agence France-Presse and Getty Images for infringing on Morel’s copyright. Back in 2010, when a violent earthquake hit Haiti, Morel was one of the few photojournalists on the […]
-
November 27, 2013
Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Against Future Decryption
Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Against Future Decryption: Twitter has enabled Perfect Forward Secrecy across its mobile site, website and API feeds in order to protect against future cracking of the service’s encryption. The PFS method ensures that, if the encryption key Twitter uses is cracked in the future, […]
-
November 27, 2013
Evernote Is Telling Users To Change Their Passwords
Evernote Is Telling Users To Change Their Passwords: Evernote is warning thousands of its users to change their passwords immediately. The warning follows a huge attack on Adobe, in which hackers grabbed passwords from up to 150 million Adobe customers and posted them to the Web. Evernote is worried its users may have created the […]
-
November 27, 2013
Report indicates insider threats leading cause of data breaches in last 12 months
Report indicates insider threats leading cause of data breaches in last 12 months: While threats to data security and privacy are often perceived to come from the outside, all signs point to internal threats being just as dangerous, intentional or not. Forrester recently released its Understand the State of Data Security and Privacy report, which […]