Infosecurity News
Cross-site scripting attacks up 160% in Q4 2012
Cross-site scripting (XSS) is increasingly common in the cloud computing world, up more than 160% in the fourth quarter of 2012 from the previous three months, a security firm is warning.
Worldwide communications infrastructure faces APTs, bots, DDoS; mobile networks weakest
Communications service providers and network operators are a potential weak link when it comes to security. Their networks carry every app, connect every mobile device and provide all of us with on-ramps to the internet. In short, we couldn't communicate personally or on a business level with out them. So how secure is worldwide communications infrastructure?
From hackers to obituary-readers, identity theives have many personae
From dumpster divers to pickpockets, identity thieves come in many varieties. But while identity theft continues to be one of the greatest security issues for consumers (the US Federal Trade Commission estimates that about 15 million Americans fall victim to identity fraud each year), very few consider the source – and therefore vector – of the attacks.
Java security settings can be ignored by malware
New vulnerabilities and flaws in Java are so common and frequent that it is difficult to keep pace. Less than two weeks ago it was revealed that the Java sandbox could be bypassed; now it is disclosed that the complete security settings can be ignored.
Google plots Pwnium 3 Chrome hacking contest, with $3.14 million on the line
In a move with perfect timing considering the number of Chromebooks that Google sold over the holidays (hint: a lot), the company has announced its third Pwnium hacking competition, which will have a new focus: the Chrome OS. In all, the browsing behemoth plans to award up to $3.14 million in winnings to those who can produce full exploits.
Advocacy groups mark Data Privacy Day with key announcements
The year 2012 was a very bad year for data breaches, with more than 240 million records compromised. So, to mark this week’s international Data Privacy Day, the Online Trust Alliance has released its ‘2013 Data Protection and Breach Readiness Guide’ to help organizations prevent and respond to such incidents.
Anatomy of a botnet targeting Facebook users
PokerAgent, a trojan botnet that infected about 800 computers, mainly in Israel, and stole around 16,000 Facebook credentials during 2011/2012 is analyzed in depth.
Lessons to learn from the Yahoo! hack
Last month Egyptian hacker ViruS_HimA claimed a hack into a Yahoo server. He provided proof without disclosing any content, and claimed his purpose was to improve security by demonstrating its weakness.
Malwarebiter is fakeAV, warns MalwareBytes
A product advertising itself as the ‘World’s greatest anti-malware software’ is really fakeAV from a site that delivers Zeus via drive-by downloading, says Malwarebytes; but Norton Safe Web doesn’t know it.
Numerous surveillance cameras may be vulnerable to unauthorized access by hackers
About 20 security camera solutions are vulnerable to hackers looking to gain remote, unauthorized access to closed-circuit surveillance networks.
Ransomware threat on the increase
While DDoS and APTs may be the main threat to business, ransomware is increasingly and effectively being targeted against the consumer. A new spike in Trojan.Ransomlock.Y detections has been noted this week.
Google facing legal battle in the UK over Safari cookies
Today is Data Protection Day in Europe (Data Privacy Day in the US/Canada). It also marks the launch of a new Facebook page, ‘Safari Users Against Google's Secret Tracking.’
Twitter ordered by France to reveal anti-semitic tweeters
A French court yesterday ruled that Twitter must reveal the identities of users who post racist and anti-Semitic comments following demands from the Union of Jewish Students of France (UEJF).
Senate Democrats introduce 2013 Cybersecurity Act
After a US presidential election season that saw cybersecurity policy come front and center in debates and as planks in political platforms, the US Senate Committee on Commerce said this week that it is reviving the debate surrounding the passage of a comprehensive cybersecurity bill with a new proposal.
Eastern European CERTs stage massive Virut botnet takedown
A large Eastern European botnet has been thwarted in Poland and Russia – for now. Local Computer Emergency Response Teams (CERTs) and partners have shut down the Virut threat, which in Poland alone commanded more than 890,000 unique IP addresses.
ICO fines Sony £250,000 for loss of personal data in 2011
In a monetary penalty notice dated 14 January but announced today, the Information Commissioner’s Office has fined Sony Computer Entertainment Europe Ltd £250,000 for a serious breach of the UK's Data Protection Act.
SCADA password-cracker targets Siemens gear
SCADA vulnerabilities are once again making their frightening selves known with the revelation that a new password-cracker is specifically targeting industrial control systems.
Cybersecurity faces mostly 'post-PC' threats
Even as the existing cybersecurity threat landscape becomes more complex, IT departments should be looking to the next wrinkle: cybercriminals have moved beyond the PC, targeting Android, social media and the Mac OS X with new attacks.
New features available for GoAnywhere file transfer services
Linoma Software, the managed file transfer and data encryption specialist, has announced new clustering and load balancing capabilities for its GoAnywhere Services version 3.1 offering.
Why did WikiLeaks dox Swartz?
In a brief series of tweets, WikiLeaks seems to have named Aaron Swartz as a WikiLeaks contributor; but the motivation for the move remains unclear.