Latest stories

  • in

    New Attack Highlights Need for Defense in Depth

    Earlier this week, researchers claimed to have developed a way to bypass the protection mechanisms used in many popular anti-virus software applications. The code works, according to The Register, by “sending them a sample of benign code that passes their security checks and then, before it’s executed, swaps it out with a malicious payload.” The […] More

  • in

    Copyright Trojan Targets Unsuspecting Users

    The security researchers at F-Secure have found a new “ransom Trojan” making the rounds that claims to find copyright violations on a target’s computer. The Trojan tries to convince the victim to pay a pre-trial settlement of $400 to cover the costs of a “Copyright holder fine.” The malware tells the victim that an “antipiracy […] More

  • Staying Anonymous in a Time of Surveillance - top government contractors - best government contracting event
    in

    Staying Anonymous in a Time of Surveillance

    From Googling to emailing to social networking, every day millions of Americans unknowingly leave behind digital breadcrumbs while surfing the web, sometimes at the risk of compromising their anonymity. But while there is technology available to stay anonymous in a time of surveillance, experts say policies and legislation won’t protect web users from privacy invasion […] More

  • in

    Hacker Uses Fake Lawsuit to Spread Malware

    Cyber criminals are becoming increasingly sophisticated, using a variety of attack vectors to distribute malware. Researchers at F-Secure recently found an instance where a hacker used a fake lawsuit email to download malware to a victim’s computer. The email, which appears below, is sent as an attachment that claims the “Marcus Law Center” has filed […] More

  • in

    Finnish Database Breached, Reveals Poor Cyber Hygiene

    Earlier this week, the database of a popular Finnish game and quiz website was compromised, leaking more than 127,000 user names and passwords, according to researchers at F-Secure. Älypää, the popular website, suspended service following the attack. While the website does not keep any personal data on individuals using the website, the real danger from […] More

  • in

    Attacks Using PDF Exploits on the Rise

    When hackers look assemble their tools to carry out attacks, they often look to exploit commonly used platforms in an effort to increase the number of potential targets. This is why more hackers write viruses for PCs instead of Macs, since the majority of the world’s computer users utilize PCs. The same holds true for […] More

  • in

    Twitter's Two Sides of the Coin

    Recently, a reported phishing attack using Twitter unknowingly compromised user account information.  Users received tweets or direct messages using phrasing such as “This you?” or ” LOL is this you” which then sent the Twitter user to an account which asked for identification verification. Then the user is directed towards the Twitter fail whale. Most […] More

  • in

    The All Seeing Eye (or the Camera in your Computer)

    One school district in Pennsylvania is using Macbook cameras for a whole new purpose. Parents in this district believe that schools periodically turn on the cameras to monitor the student and their usage of the county issued computer. Parents are outraged and have asked a federal judge to ban the practice. The school district insists […] More

  • in

    The Chinese Are Coming: Cyber Espionage Targets Government Contractors

    U.S. government networks are consistently probed for vulnerabilities by hackers and foreign intelligence agencies. The difficulty of attribution combined with the ease of access and decreased physical risk makes cyber espionage a favorite tool of more advanced intelligence services. Foreign governments seek information for U.S.-based networks for a variety of reasons, including intelligence gathering and […] More

  • in

    Beware of Social Networking

    The UK Ministry of Defense has experienced the leaking of classified information via social networking sites 16 times in the past 18 months, according to a Freedom of Information Act request filed by F-Secure and Lewis Communications. The majority of computer networks administered by MoD do not allow users to access social networking sites. However, […] More

  • in

    Sweden's SIGINT Agency Hit by DDoS

    Försvarets Radioanstalt (FRA), the SIGINT Agency in Sweden, was subjected to a distributed denial of service attack that lasted from Monday to Thursday, according to agency officials. In a statement released by the agency, FRA officials said the attack did not hamper their ability to conduct their operations. The website, FRA.se, was subjected to the […] More

ExecutiveBiz Logo

Receive Daily News Briefing And Event Updates Straight to Your Inbox