Security Technology

add news feed

tweet a story

As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes ...
As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs. Here are the FOXACID basics: By the time the NSA...
about 1 hour ago
The commercial-drone scene in the United States is operating in a so-called grey area, with some companies shuttering because of Federal Aviation Administration cease-and-desist orders. Others, however, are performing their aerial filmin...
The commercial-drone scene in the United States is operating in a so-called grey area, with some companies shuttering because of Federal Aviation Administration cease-and-desist orders. Others, however, are performing their aerial filming, and crop and real estate surveying businesses underground ...
about 2 hours ago
The man believed to be responsible for distributing the notorious Blackhole malware toolkit has been arrested in Russia, a source told Reuters today. The source, a former Russian police detective in contact with Russia's federal governme...
The man believed to be responsible for distributing the notorious Blackhole malware toolkit has been arrested in Russia, a source told Reuters today. The source, a former Russian police detective in contact with Russia's federal government, said that the man went by “Paunch” in hacking circles. No other information was given, but a spokesman for Europol in the Hague told Reuters that the police agency “had been informed that a high-level suspected cyber-criminal” had been arrested in Russia. Blackhole is a widely known exploit toolkit that makes “drive-by” attacks easier for hackers to execute. It allows criminals to inject malware onto PCs that either visit exploit sites or are redirected to exploit sites from compromised websites. As one of the primary names behind Blackhole, Paunch kept the toolkit current as new weaknesses in commonly used programs were discovered: in 2012 Paunch released Blackhole 2.0, and recent custom versions of the toolkit incorporated ways to exploit vulnerabilities in Adobe Reader and Java's browser plugin. Read 1 remaining paragraphs | Comments
about 7 hours ago
A hacker group calling itself Kdms Team, claiming to hail from Palestine, took credit on Twitter for several recent attacks against websites.
A hacker group calling itself Kdms Team, claiming to hail from Palestine, took credit on Twitter for several recent attacks against websites.
about 15 hours ago
A hacker group calling itself Kdms Team, claiming to hail from Palestine, took credit on Twitter for several recent attacks against websites.
A hacker group calling itself Kdms Team, claiming to hail from Palestine, took credit on Twitter for several recent attacks against websites.
about 15 hours ago
The October Patch Tuesday release marks the 10th anniversary for Microsoft's monthly security updates.
The October Patch Tuesday release marks the 10th anniversary for Microsoft's monthly security updates.
about 15 hours ago
The October Patch Tuesday release marks the 10th anniversary for Microsoft's monthly security updates.
The October Patch Tuesday release marks the 10th anniversary for Microsoft's monthly security updates.
about 15 hours ago
Wikipedia At least three high-profile websites that receive services from Network Solutions have been hijacked in recent days in attacks that are prompting speculation that the compromises are the result of a security lapse inside the...
Wikipedia At least three high-profile websites that receive services from Network Solutions have been hijacked in recent days in attacks that are prompting speculation that the compromises are the result of a security lapse inside the popular domain registrar and Web host. Competing antivirus providers Avira and AVG are confirmed to have been hit, as was messaging software developer Whatsapp. Alexa and Redtube have also been reported to be struck by the same attackers, although that claim wasn't verified. All five websites rely on services from Network Solutions, which is owned by Web.com. At least some of the victims report losing control of the domain name system (DNS) servers used to route Internet traffic, a lapse that made it possible for hackers to redirect e-mail and Web traffic to malicious servers. "It appears that our account used to manage DNS records registered at Network Solutions has received a fake password-reset request which was honored by the provider," Avira officials wrote in a blog post published Tuesday. "Using the new credentials, the cybercriminals have been able to change the entries to point to their DNS servers." Read 4 remaining paragraphs | Comments
about 16 hours ago
Internet Explorer (IE), Office, Silverlight, .NET Framework are just some of the software addressed in this month’s Microsoft Patch Tuesday. Among these software, however, users must prioritize the IE vulnerability (CVE-2013-3893) ...
Internet Explorer (IE), Office, Silverlight, .NET Framework are just some of the software addressed in this month’s Microsoft Patch Tuesday. Among these software, however, users must prioritize the IE vulnerability (CVE-2013-3893) as this was said to be exploited in certain targeted attacks. Among the eight bulletins released October 2013 Patch Tuesday, four were rated Critical while the rest were Important. One of these four Critical bulletins includes a fix for the recent  Internet Explorer zero-day, which was used in attacks aimed at organizations in the Asia Pacific region and three other targeted attack campaigns. This threat surfaced just a week after last month’s Patch Tuesday and as an immediate solution, Microsoft released a “Fix It” workaround tool. This security bulletin offers a permanent solution to the said vulnerability as well as nine other privately disclosed bugs. Trend Micro Deep Security and Intrusion Defense Firewall (IDF) has already been protecting customers from this threat via the following DPI rule: 1005689 – Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893) The other bulletins tagged as Critical address vulnerabilities in Microsoft Windows and the .NET Framework. These Critical vulnerabilities may allow malicious actors to execute malware that may steal information or enable attackers to control the vulnerable system. Though not as immediate in terms of priority, the remaining four Important bulletins offers solution to crucial vulnerabilities in Microsoft Office and Silverlight. If not addressed, malicious threat actors may use this to gain access to valuable information or to a certain extent, allow them to execute malicious files (given certain conditions). Users are advised to apply these security updates as soon as possible. You may also visit our Trend Micro Threat Encyclopedia page to know more about our Deep Security solution. Post from: Trendlabs Security Intelligence Blog - by Trend MicroOctober Patch Tuesday Addresses IE Zero-Day Exploit
about 16 hours ago
A recent study reveals that the costs organizations incur as a result of cyber crime has gone up, and so has the time it takes to resolve those attacks.
A recent study reveals that the costs organizations incur as a result of cyber crime has gone up, and so has the time it takes to resolve those attacks.
about 17 hours ago