Researchers have discovered a serious vulnerability affecting multiple distributions of the Linux OS. While there are patches available the clean up effort is likely to going be a major task for Linux admins.
Liam Tung |
28 Jan |
Read more
On the heels of two real Flash Player security updates being distributed by Adobe Systems this week, hackers are spreading a fake update for the media player via a scam on Facebook that has exposed at least 5,000 users to the threat.
Liam Tung |
27 Jan |
Read more
Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.
George V. Hulme |
23 Jan |
Read more
Firefox users should probably disable Flash, with an attack that only worked on Internet Explorer (IE) yesterday now also effective against the Flash plugin for Mozilla’s browser. The good news? Microsoft has released a fix for affected IE users.
Liam Tung |
23 Jan |
Read more
An exploit kit known as Angler is targeting a previously unseen flaw in the latest version of Flash Player, which Adobe only updated a week ago.
Liam Tung |
22 Jan |
Read more
A hacker, said to be an Australian, may be one of the key members behind the Ukrainian separatist hacking group that claimed responsibility for attacks on German government websites earlier this month.
Liam Tung |
21 Jan |
Read more
Weeks after the Chinese government blocked Gmail, some Outlook users in the country have reported suspicious attempts to intercept their email and passwords.
Liam Tung |
20 Jan |
Read more
Big-name security tools aren't catching anywhere near all of the malware
they are presented with, according to the latest lab testing results from
Enex Labs, which found during testing in the second half of 2014 that as
many as 100 percent of tested malware was making it through the defences of eight popular security tools. The
results were corroborated by a FireEye study that found traditional
security defences simply are not stopping security breaches.
David Braue |
19 Jan |
Read more
Ransomware authors are increasingly focusing on customer service in an attempt to improve the efficacy of attacks, security analysts have warned as a new version of CryptoWall malware appeared and Australian researchers warned that carefully-crafted localised ransomware is increasingly hitting its mark.
David Braue |
16 Jan |
Read more
Carberp, a banking trojan that recently hit over 150,000 Australian PCs, is taking a second bite at Australia through spam email loaded with malware.
Liam Tung |
16 Jan |
Read more
A growing profile for managed services and the adoption of cloud-based security services are among the key security priorities expected to define the market in 2015, Dimension Data security experts have advised based on their regular interactions with clients during 2014.
David Braue |
15 Jan |
Read more
Security operations centers (SOC) have been around for a while, stretching back to the old room full of live camera feeds. The intent of a SOC is simple: provide the business with the ability to see what is going on in order to take action if necessary. The level of SOC sophistication varied depending on the risks and infrastructure complexity. Consider the humble stretch of road and an analogy for businesses in the very early days of the internet: In low risk, low traffic areas, it was often not necessary to have a constant additional surveillance of this road. Road rules -- basic perimeter-based network security measures like firewalls -- still applied, but it was considered sufficient for any out-of-the-ordinary incidents to be handled reactively.
Michael Lee |
20 Jan |
Read more
US Central Command (Centcom) has dismissed the acts, which saw its YouTube and Twitter accounts briefly fall into the hands of hackers and used to distribute pro-ISIS messages as “cyber vandalism” and said that none of its military servers were compromised during the incident.
Andrew Colley |
14 Jan |
Read more
A high-profile hack by terrorist group ISIS has reinforced the importance of new high-level cybersecurity initiatives that have won support from retail and banking leaders as US president Obama prepares to deliver his annual State of the Union address next week.
David Braue |
13 Jan |
Read more
Microsoft Scroogled website now redirects visitors to a more neutral website, but the company isn’t entirely ready to let go of its Google-bashing campaign yet.
Liam Tung |
13 Jan |
Read more
Despite a few security hiccups, Apple's OS X and iOS platforms have been generally very secure. While all users are potentially vulnerable to phishing attacks and identity theft, Apple's platforms have been solid. But that seems to be changing with the identification of a flaw in Apple's Thunderbolt ports that can used to write custom code into the Mac's boot ROM.
Anthony Caruana |
08 Jan |
Read more
European companies in the business of selling spyware and exploits to international governments and law enforcement will need a special licence from 31 December 2014
Liam Tung |
19 Dec |
Read more
Software developers are making fewer obvious security mistakes in their coding but the persistence of simple mistakes like SQL injection vulnerabilities shows that many are still failing to take even basic precautions in their coding, the newest member of the board of open-security effort OWASP (Open Web Application Security Project) has warned.
David Braue |
17 Dec |
Read more
The USB interface may have become standard for powering all kinds of devices, but anecdotal warnings are emerging about devices that arrive prepackaged with embedded malware that infects target systems as soon as they are plugged into the computer.
David Braue |
09 Dec |
Read more
A hack of Sony Pictures' systems led to the leaking of pre-release versions of numerous movies as well as a massive archive of sales contracts and other data. The hack led to a high-scrutiny investigation of technical evidence – including suggestions North Korea was behind the attack due to the controversial content of one of the films.
David Braue |
08 Dec |
Read more