security firms

security firms

Chinese hackers resume attacks on U.S. targets

www.pcworld.com
For the last three months or so, the U.S. government and some of its defense contractors have engaged in a war of shame on China to pressure it to cool its cyber-attacks on U.S. targets. The campaign appeared to be yielding results, but it seems that Chinese hackers were...
Chinese hackers resume attacks on U.S. targets

Drones on display: security firms go hi-tech in rush to seal the border

www.guardian.co.uk
Private surveillance companies flock to Arizona's annual Border Security Expo for their slice of a multi-billion dollar industryFrom a distance, it looked like Wyatt Nease was using a handset to operate a remote control car. However, the small wheeled vehicle zipping across the carpet was not a child's toy but...
Drones on display: security firms go hi-tech in rush to seal the border

Still trying to remove Flashback from your Mac? Antivirus firms to the rescue

arstechnica.com
Those eager to check for and remove Flashback malware from their Macs won't have to wait for Apple to release its own software, as two security firms have now swooped in with their own tools. The first is Kaspersky Lab, which was the first well-known security firm to confirm...
Still trying to remove Flashback from your Mac? Antivirus firms to the rescue

Microsoft rushes Explorer 8 patch release

www.pcworld.com
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month.Microsoft's speedy release of this patch "is an outstanding example of Microsoft's responsiveness to the security community and their users," wrote...
Microsoft rushes Explorer 8 patch release

OPERATION HIGH ROLLER: This Massive Cyber Attack Has Siphoned As Much As $2.5 Billion From World Banks

www.businessinsider.com
McAfee and Guardian Analytics have discovered a highly sophisticated and ongoing cyber attack that has siphoned as much as $2.5 billion from bank accounts in Europe, the U.S. and Colombia. The attack, named "Operation High Roller," does not require human participation but does involve a combination of "an insider level of...
OPERATION HIGH ROLLER: This Massive Cyber Attack Has Siphoned As Much As $2.5 Billion From World Banks

Mobile Security Takes a Front Row Seat at MWC

siliconfilter.com
Not too long ago, nobody really worried too much about mobile security. The worst thing that could really happen to your data on your phone, most people thought, was that you would lose the physical device and somebody could make calls or browse your address book. Today, however, with the...
Mobile Security Takes a Front Row Seat at MWC
The green scare: just how safe is Android?

Wide-scale attack against WordPress blogs reported

www.pcworld.com
Unidentified hackers are said to have have launched a large-scale attack against WordPress blogs and any hosts using weak passwords are urged to update them immediately.Security firms have been tracking an escalating number of "brute force" attacks against WordPress installations, which have been trying out logins such as "admin"...
Wide-scale attack against WordPress blogs reported

Spamhaus hit by biggest-ever DDoS attacks

www.computerworld.com
Anti-spam service Spamhaus has been hit with what several security firms today described as the largest distributed denial of service (DDoS) attacks ever seen....
Spamhaus hit by biggest-ever DDoS attacks

Security firms warn of malware that exploits Windows AutoRun

www.csoonline.com
Antivirus vendors are warning customers of a spreading malware that can infect computers through a well-known bug in the Windows AutoRun software used to automatically launch programs on a DVD or USB device. The significant increase in infection is curious because Windows 7 and Windows 8 PCs will not...
Security firms warn of malware that exploits Windows AutoRun

Fingerprint identification flaw allows PC password retrieval

www.electronista.com
Several PC security firms have independently verified a weakness in Authentek's UPEK Protector Suite that allows hostile users with physical control of a machine to rapidly recover Windows account passwords. The software is pre-installed in Windows-based PCs by makers including Dell, Gateway, NEC, Samsung, Sony, and Toshiba. An open-source exploit...
Fingerprint identification flaw allows PC password retrieval

The Internet Apocalypse That Wasn't

bits.blogs.nytimes.com
Several security firms and media reports predicted that Monday would be remembered as the day millions lost their Internet connections. Those concerns did not play out, though it is not clear how many people were affected in the end....
The Internet Apocalypse That Wasn't
Hotel locks to be replaced after hack leads to thefts

Keep Yourself Safe From Online Disasters

chris.pirillo.com
Keep Yourself Safe From Online Disasters is a post from Chris PirilloIn 2008, there was some published data about how many laptops were lost or stolen each week at U.S. airports. The number was staggering. The 2008 research put the number at over 10,000 laptops per week. With the increasing...
Keep Yourself Safe From Online Disasters
Carriers and developers feed on growing Android security fears -- but are they real?

Two thirds of Madi cyber espionage targets based in Israel

www.guardian.co.uk
Security experts discover 62% of the approximately 800 victims of malware campaign have been based in IsraelNearly two thirds of the government officials, lobbyists and other victims of the cyber espionage campaign dubbed Madi were based in Israel, security experts have discovered.An investigation by the security firm Symantec, published on...
Two thirds of Madi cyber espionage targets based in Israel

Hackers ramp up attacks against Tibetan activists

www.computerworld.com
Hackers are ramping up their attacks against Tibetan activists and are using increasingly sophisticated techniques to deliver malware, according to researchers from security firms FireEye and Trend Micro....
Hackers ramp up attacks against Tibetan activists

Banking malware is getting sneaker, security firms warn

www.pcworld.com
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals today are capable of tampering in real time with online banking sessions initiated by...
Banking malware is getting sneaker, security firms warn

F-Secure Explains Why It Missed Spotting Flame, Despite Having Seen It Two Years Ago

www.techdirt.com
With all the attention on the Flame malware, there's a great post over at Wired by F-Secure's Chief Research Officer, Mikko Hypponen, explaining why various security firms totally missed Flame (and Stuxnet and DuQu) for quite some time -- despite samples having been sent all the way back to 2010....
F-Secure Explains Why It Missed Spotting Flame, Despite Having Seen It Two Years Ago
Microsoft reveals hole in IE, urges people to update their browsers

Top Apple, Windows hacker hired to provide Twitter security

www.electronista.com
A prolific white-hat hacker that repeatedly attacked Apple products along with Windows systems for prize money has been hired by Twitter. Charlie Miller, previously a penetration tester for various security firms and a former "Global Exploitation Analyst" for the NSA, will join a team dedicated to finding security flaws in...
Top Apple, Windows hacker hired to provide Twitter security

Home Security From the Cable Guy – Is it Worth it?

blogs.wsj.com
Cable companies have branched out into security systems. Should you sign up? The services from companies such as Comcast and Time Warner Cable are cheaper than those from dedicated security firms — typical $10 to $40 per month, instead of $30 to $75, Kelli Grant writes in Smartmoney.com. But experts...
Home Security From the Cable Guy – Is it Worth it?

Researchers discover new, in-use vulnerability in Java

www.electronista.com
A new vulnerability has been discovered in the latest versions of Java, v1.6 Update 41 and v1.7 Update 15, say researchers from security firms FireEye and Kaspersky Lab. Critically the bug is already being exploited in order to download and install a remote access tool, "McRAT," on targeted computers. The...
Researchers discover new, in-use vulnerability in Java
Chinese hackers drain U.S. military secrets from defense contractor

Security firms disable the second Kelihos botnet

www.computerworld.com
A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the second version of the Kelihos botnet, which is significantly bigger than the one shut down by Microsoft and its partners in September 2011....
Security firms disable the second Kelihos botnet

How Flame has changed everything for online security firms

www.guardian.co.uk
The Flame virus went undetected for two years by every online security firm. Now they need to find a new way to protect the world's PCs from malwareHere's a question: if you connect an unprotected Windows computer to the internet, how long will it take before it is infected by...
How Flame has changed everything for online security firms

Security Firms Disable the Second Kelihos Botnet

www.pcworld.com
A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the......
Security Firms Disable the Second Kelihos Botnet

SigFig Launches To Be The Data-Driven Financial Planner Of Your Dreams

techcrunch.com
Whether you have $10,000 or $10 million dollars, trying to find help to manage your investments can be a minefield. Mid-level financial advisory firms have come under scrutiny for somewhat shady practices — so even though you can certainly find very good advisers there, it can be a crap...
SigFig Launches To Be The Data-Driven Financial Planner Of Your Dreams

Spam virus hits Android video games

www.bbc.co.uk
Security firms are issuing warnings about a virus that uses Android phones to send junk mail from phone to phone...
Spam virus hits Android video games

New research: Most top torrents are monitored, your IP address can be logged within three hours

thenextweb.com
If you’ve downloaded a popular torrent in the last three years, you may have had your IP address logged and your activities monitored, according to new research. Computer scientists from the University of Birmingham tracked BitTorrent traffic during five separate timeframes: July 2009, August 2009, August 2010, February 2011, and...
New research: Most top torrents are monitored, your IP address can be logged within three hours
× Just a test of the new info bar. What do you think?