Lilupophilupop tops 1million infected pages, (Sat, Dec 31st)
Updated: 2011-12-31 07:33:00
Earlier in the month we published an article regarding the lilupophilupop.com SQL injection attacks ...(more)...
Defense contractor Raytheon has acquired privately held Henggeler Computer Consultants, an enterprise architecture, software and analytics systems integrator for intelligence and defense customers. - Defense contractor Raytheon has acquired Henggeler Computer Consultants, its third cyber-related acquisition in 2011.
Raytheon acquired Henggeler, based in Columbia, Md., to expand Raytheon's cyber-security portfolio and better meet the needs of its customers in the intelligence community, the defe...
Microsoft has issued a critical security patch to fix a vulnerability affecting all versions of Microsoft's .NET Framework. - Microsoft has released a
security update to patch an issue associated with Security
Advisory 2659883. The vulnerability apparently affects all versions of
Microsoft's .NET Framework, and could allow a denial-of-service attack on
servers for ASP.NET pages.
quot;The vulnerability
exists due to ...
US-CERT warned the WPS PIN used by many routers to secure wireless networks could be exposed through brute-force decoding and it recommended disabling the PIN. An attack tool is already available. - A security researcher has demonstrated a flaw in the WiFi Protected standard that would expose Wireless networks to brute-force attacks, prompting the United States Computer Emergency Response Team to issue a vulnerability warning.
quot;The Wi-Fi Protected Setup (WPS) PIN is susceptible to a bru...
Mobile device users continue to be lax about installing security software or using strong pass codes to protect data saved on their mobile devices, behavior that can have an impact on enterprises. - Mobile users have a false
sense of security when it comes to their devices, according to a recent report
from McAfee.
About 70 percent of
smartphone owners said they considered their devices to be safe from
cyber-crime, according to a report from the National Cyber-Security Alliance
and McAfee...
The majority of the Facebook scams in 2011 used social-engineering tactics to trick users into going to affiliate marketing sites to fill out surveys, Commtouch said. - Cyber-criminals are no longer just using Facebook for identity theft or phishing scams. Now, they are also using the social-networking platform to defraud affiliate businesses, according to security researchers.
Facebook swindlers directed their victims toward affiliate marketing sites in approxima...
Boards of directors are asking their chief security officers to talk about security. This is an opportunity for these executives to address network visibility without overwhelming them with technical jargon. - Thanks to the number of high-profile security incidents and breaches in 2011, corporate boards and senior executives are thinking about security more than ever as they hammer out budget details and resource allocations for 2012.
As part of these discussions, many boards of directors, often for the ...
The newly disclosed vulnerability in Web application frameworks such as Microsoft's ASP.NET can be exploited to trigger a denial of service on vulnerable Web servers. - Microsoft
has released a workaround for an ASP.NET vulnerability to help protect Websites
against potential denial-of-service (DoS) attacks, according to a security
advisory.
The
publicly disclosed vulnerability affects all supported versions of the .NET
framework, but Microsoft is quot;not a...
Targeted attacks, hacktivist campaigns and the rise of mobile malware were just a handful of security news that dominated 2011's headlines. - 2011
was a momentous year in many aspects for the security industry, with high
profile cyber-attacks and data breaches, but also a year in which many of the
incidents evoked a sense of déjà vu amongst industry observers.
quot;2011
was the Year of the Hack, quot; Harry Sverdlove, CTO of Bit9, t...
Stratfor has asserted that hackers from the Anonymous collective did not steal its confidential client list, but rather a list of people who had purchased its publications. - Strategic Forecasting, an organization that focuses on
intenerational security issues, is downplaying the severity of the cyber-attack
it suffered over the weekend, claiming its client list had not been stolen.
A group of hackers claiming to be part of the hacktivist
collective Anonymous attacke...
Securely sanitizing hard disk drives and other IT equipment is critical when retiring old and obsolete equipment to prevent leaking sensitive data. - A new computer, mobile device or other
IT equipment generally requires some effort setting up and migrating data.
Enterprises also need to spend the time making sure the data is completely
removed from the equipment as it is replaced.
Organizations do not always stop to
consider the security im...
Hackers posted what they claimed to be personal details of the company's clients on the information-sharing site Pastebin. - The loosely-associated band
of hackers known as Anonymous claims to have targeted the global intelligence
think tank Strategic Forecasting, known as Stratfor, boasting on the microblogging
site Twitter that personal information, including credit card numbers,
belonging to Stratfor clients had be...
This next year is going to yield many debates on what our current President has or has not accomplished in his first term. Here’s a collection (of lists) of what he has accomplished. http://obamaachievements.org/listA seriously comprehensive list of accomplishments, by category. PolitiFact Promises Kept ListingA phenomenally unbiased list of promises and statements made by Obama, [...]
The government's case against Bradley Manning, Juniper's patent lawsuit against Palo Alto Networks and cyber-attacks were among this week's security headlines. - The United States government
began presenting its case against Army Private Bradley Manning last week and
continued this week. Manning is accused of illegally accessing thousands of
classified documents and video and leaking it to the whistleblower site WikiLeaks.
The witnesses for the prosecuti...
The operators of the Koobface botnet added a mechanism to monitor and drive Internet traffic through various affiliate sites to increase their clickthrough revenue. - The group behind the Koobface
is back, and they are reinventing themselves to take advantage of pay-per-click
advertising, according to Trend Micro.
The Koobface developers
updated their botnet framework with a quot;sophisticated quot; traffic-direction
system (TDS) that handles traffic refere...
2011 has been a busy year for Veracode on the event circuit. The Veracode team has spoken at nearly 200 industry events this year. We racked up frequent flyer miles, collected a rainbow assortment of conference badges, and generally had fun presenting to all of you that attended the year’s major (and minor) industry and [...]
When we last left our intrepid hero, he was embarking on an quest to become an information security thought leader. A year has passed; let’s see how he’s doing! Enjoy.
Those of you in the Boston area may have seen Veracode’s very own Chris Eng (VP of Research) on the local CBS news Monday night. Chris is featured in a story about storing personal information in the cloud. Chris discusses best practices and advises users about operating and storing documents in the cloud. We think [...]
I remember the days when I used download.com to grab utilities and shareware, never really questioning why I used download.com. All I knew is that it was safe and fast, usually appearing as a top search result in Google and it was always available. Unfortunately, CBS Interactive found that it would be monetarily advantageous to bundle downloads in [...]
This week I was invited to lend my “expert thoughts” on a recent news piece on a UK intelligence agency which has opened up their hiring practices to include an online code cracking competition. The team over at CNN’s Situation Room thought this was an interesting concept and invited me in for a quick discussion. [...]