Category Archives: Uncategorized
As concern mounts over cyber warfare between nations, major Wall Street firms will take part later this month in a simulated network disruption exercise aimed at testing their ability to respond to a widespread attack.
Phishing attacks in Iran have spiked dramatically in recent weeks and appear to be related to presidential elections in the country tomorrow (Friday June 14), Google said this week. Eric Grosse, vice president of security engineering, said in a blog post that over the last three weeks the company had detected and disrupted “multiple email-based phishing campaigns aimed at compromising … Read more
If you thought your iPhone or iPad was relatively safe from being hacked, think again – researchers at Georgia Institute of Technology say they have found a way to infect them with malware using a simple-to-make USB charger. The researchers – Billy Lau, Yeongjin Jang and Chengyu Song – are due to discuss their “alarming” findings at the Black Hat conference … Read more
More and more Americans are installing home automation systems which, among other things, control physical access and security. If the list of topics at next month’s Black Hat conference is anything to go by, we should be getting nervous. Very nervous. At least three presentations at the security conference in Las Vegas will deal with the issue of home automation and … Read more
New cyber threats helped to boost global revenue from security software to $19.13 billion last year, a 7.9 percent increase from 2011 revenue of $17.73 billion, according to the IT research company Gartner, Inc. In a release issued this week, Gartner research director Ruggero Contu said the security market experienced increased demand for consumer and enterprise security tools.
Anonymous backers of Syrian President Bashar al-Assad have reportedly hacked the Twitter account of British broadcaster ITV and made a failed attempt to sabotage the water supply of Haifa in Israel. The attack on ITV last Friday took place just days after Twitter introduced its new “two-factor” authentication system in an attempt to block such infiltration. It was not immediately … Read more
Is your company vulnerable to a DNS amplification attack? Maybe, but it’s in the hands of your Internet connectivity provider
In the past few weeks, we’ve been hearing more about a type of DDoS attack called a DNS amplification attack. In sending out a general alert about this type of attack, the U.S. Computer Emergency Readiness Team (US-CERT) defined the problem as follows: