Sunday, January 31, 2010
NY Times: Britain Warned Businesses of Threat of Chinese Spying
Read more ...
Zero-Days — The CyberCriminal's New Favorite Tool
Friday, January 29, 2010
Brian Krebs: Simmering Over a ‘Cyber Cold War’
Read more ...
Tuesday, January 26, 2010
Texas Bank Sues Customer Hit by $800,000 Cyber Heist
Read more at KrebsOnSecurity.com ...
PC World: PlayStation 3 Hack Released Online
Read more ...
Monday, January 25, 2010
Brian Krebs: A Peek Inside the ‘Eleonore’ Browser Exploit Kit
Read more ...
NY Times: In Digital Combat, U.S. Finds No Easy Deterrent
WASHINGTON — On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation’s power grids, its communications systems or its financial networks.... The results were dispiriting. The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further damage by threatening retaliation. What’s more, the military commanders noted that they even lacked the legal authority to respond — especially because it was never clear if the attack was an act of vandalism, an attempt at commercial theft or a state-sponsored effort to cripple the United States, perhaps as a prelude to a conventional war.
Saturday, January 23, 2010
Brian Krebs: Adobe Ships Critical Shockwave Update
Read more ...
Friday, January 22, 2010
Brian Krebs: Cyber Crooks Cooked the Books at Fla. Library
Jan. 7, 2010 was a typical sunny Thursday morning at the Delray Beach Public Library in coastal Florida, aside from one, ominous dark cloud on the horizon: It was the first time in as long as anyone could remember that the books simply weren’t checking out.
Sure, patrons were still able to borrow tomes in the usual way — by presenting their library cards. The trouble was, none of the staff could figure out how or why nearly $160,000 had disappeared from their bank ledgers virtually overnight. The money was sent in sub-$10,000 chunks to some 16 new employees that had been added to the usual outgoing direct deposit payroll.
CSO Online: Botnets: "The Democratization of Espionage"
Read more ...
The Biz Coach: How to Protect Yourself from the Internet Crime Wave
Thursday, January 21, 2010
FTC Says Mortgage Broker Broke Data Security Laws: Dumpster Wrong Place for Consumers’ Personal Information
Read more ...
Brian Krebs: Microsoft Issues Emergency Fix for IE Flaw
Read more ...
Wednesday, January 20, 2010
NY Times: The 3 Facebook Settings Every User Should Check Now
Read more ...
NY Times: If Your Password Is 123456, Just Make It HackMe
Read more ...
Tuesday, January 19, 2010
NY Times: Fearing Hackers Who Leave No Trace
Read more ...
Monday, January 18, 2010
FoxNews: Google Hack Leaked to Internet; Security Experts Urge Vigilance
Read more ...
Sunday, January 17, 2010
NY Times: Companies Fight Endless War Against Computer Attacks
Read more ...
Saturday, January 16, 2010
Washington Post: U.S. plans to issue official protest to China over attack on Google
Read more ...
Friday, January 15, 2010
NY Times: McAfee Says Microsoft Flaw Was a Factor in Cyberattacks
McAfee, the big security software maker, has been investigating the China-based cyberattacks that prompted Google to threaten to pull out of China altogether. ... In a blog post on Thursday afternoon, McAfee said that after examining the malicious software code used in the attacks, it believes a vulnerability in Microsoft’s Internet Explorer browser was an important pathway for the attacks, which were directed at Google and more than 30 other companies:
These attacks will look like they come from a trusted source, leading the target to fall for the trap and clicking a link or file. That’s when the exploitation takes place, using the vulnerability in Microsoft’s Internet Explorer.
Once the malware is downloaded and installed, it opens a back door that allows the attacker to perform reconnaissance and gain complete control over the compromised system. The attacker can now identify high value targets and start to siphon off valuable data from the company.
BBC: Cybercriminals revive old scams to target smartphones
As mobile phones get more sophisticated, hi-tech criminals are dusting off some old tricks. ... Security companies have noticed a rise in trojans known as dialers that used to be popular during the days of dial-up net access. ... On a smartphone the dialers are being used to call premium rate lines leaving victims with a big bill.
Thanks to Terry Corbell for this
Thursday, January 14, 2010
NY Times: After Google’s Stand on China, U.S. Treads Lightly
Read more ...
Washington Post: Google China cyberattack part of vast espionage campaign, experts say
Read more ...
Wednesday, January 13, 2010
Brian Krebs: Microsoft, Adobe Issue Security Updates
Read more ...
Tuesday, January 12, 2010
NY Times: Google Threatens Pullout from China After Cyberattacks on Dissidents
In a calm and understated blog post, Google said Tuesday that it had recently come under an unusual cyberattack from China. The Web giant said the attack was very different from previous ones because it was aimed at Chinese dissidents’ Gmail accounts.... Information on two accounts was accessed by the hackers, Google said. In addition, “the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties…most likely via phishing scams or malware placed on the users’ computers,” the company wrote. ... Google said it had identified about 20 other companies that had been similarly targeted.
NY Times: Google, Citing Attack, Threatens to Exit China
Read more ...
Monday, January 4, 2010
Buried Cybercrime Warning Signs
Read more ...