Cybersecurity

EXPERT ADVICE

An InfoSec Holiday Survival Guide

It's December again, and it's a challenging time for information security organizations. It's challenging because while attacks become more prevalent during the holiday season in the form of spam and targeted malware, organizational security "readiness" paradoxically wanes at exactly the same time....

SPOTLIGHT ON SECURITY

White House Gets Its Cybersecurity Research Ducks in a Row

It looks as if the United States federal government is getting even more serious about cybersecurity these days. First off, the White House released a road map that sets R&D priorities for cybersecurity in order to speed up efforts to secure the U.S. network infrastructure and change the governm...

Access to data has never been easier than it is today. With a few easy steps, it's possible to uncover just about any type of information you can imagine, even data that is supposedly legally protected, such as personal, financial, healthcare and government records. However, individuals with nefario...

What a week it's been in the cybersecurity business! On Monday, the Massachusetts Institute of Technology released a report that called for the establishment of a body with nationwide authority to oversee the securing of the United States' national power grid. Last week, Congress began working to pu...

The United States needs an overarching national authority to oversee cybersecurity efforts connected to the national power grid, an MIT study suggests. The Federal Energy Regulatory Commission and the North American Electric Reliability Corporation have authority over the development of cybersecurit...

Researchers at Columbia University have demonstrated that a remote firmware update command in some HP LaserJet printers can be hijacked, according to a report from MSNBC. In one case, a hacked printer was reportedly given commands that might cause it to get hot enough to scorch paper loaded in it. T...

SPOTLIGHT ON SECURITY

Malware for Sale

The holiday shopping season is in full swing, even for malicious hackers. Cybercriminals are lining up to lay hands on a new exploit that takes advantage of a recently patched critical security flaw in Java, security researcher Brian Krebs warned recently. On the other side of the security line, Twi...

SPOTLIGHT ON SECURITY

Bad Security Moon Rising

All things considered, this past week has been hell on security professionals. On Monday, AT&T Wireless announced that hackers used automatic scripts to target some subscribers in a bid to steal information stored in their online accounts. They apparently didn't succeed. Hackers have breached se...

Many Facebook users have complained recently about a spam flood of a most unsavory nature. Some say pornographic images and images depicting extreme violence -- sometimes both -- are showing up in their News Feeds without their consent. Others say their accounts are being used to send friends links ...

SPOTLIGHT ON SECURITY

Game of PWNs

This past week brought a plethora of cybersecurity news, with attackers going after everything from gaming platforms to advertisers' checkbooks. Steam, the massive gaming site that's part of Valve, got hacked, potentially endangering its 35 million members. Law enforcement scored a big win when the ...

SPOTLIGHT ON SECURITY

The Cybersecurity Money Pit

Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to get a foot in the door. At a security colloquium in North Virginia on Monday, the Defense Advanced Research Projects Agency told reporter...

Microsoft on Friday released a temporary fix for a Microsoft Word vulnerability that allows the Duqu worm to attack PCs. The flaw, in TrueType font parsing, could let an attacker run arbitrary code in kernel mode, installing programs; view, change or delete data; or create new accounts with full us...

The Cybermugging of America

Criminals in countries all over the world, including allies of the United States, are committing cybertheft and industrial espionage against America, the National Counterintelligence Agency has warned. In a report submitted to Congress in October, the agency states that foreign collectors of sensiti...

The Duqu malware that became widely known last month is exploiting a zero-day vulnerability in the Windows kernel to infect systems, according to the Hungarian group CrySyS. An installer file for the Trojan was previously unknown, but now CrySyS and security firm Symantec are reporting that the main...

Hackers reportedly shut down Internet service in Palestine Tuesday. Service was apparently completely shut down in Gaza and partially shut down in the West Bank after hackers unleashed malware on the main ISP in Palestine, Paltel. The Palestinians have alleged that a nation-state could be behind the...

Technewsworld Channels