OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Connected Cloud Summit
Failure to Communicate Hamstrings Cyberdefenders
July 23, 2014
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. Thirty-one percent of the nearly 5,000 respondents surveyed for a recent study said their cybersecurity team never met with the executive team about cybersecurity.
Black Hat Tor-Busting Talk Nixed
July 22, 2014
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. CMU researcher Alexander Volynkin was to deliver the briefing.
Cloud App Security: Foggy With Low Visibility
July 21, 2014
While the cloud promises faster time to market and reduced costs, it also presents a new landscape for hackers to attack and achieve their goals -- namely, to find and gain unauthorized access to data and information. Attackers follow the data they are after, and if that data is residing in the cloud, then they are going to start operating in the cloud as well.
Gameover Zombies on the March Again
July 17, 2014
The Gameover botnet is back, more or less, only six weeks or so after the Justice Department announced that an FBI-led multinational effort had disrupted it. Still, the botnet's downtime was longer than expected -- the UK's National Crime Agency had warned that the people running it would regain control within two weeks. Sophos this week spotted a new version of the malware.
Google's Project Zero Cybersecurity Watch: No Excuses
July 15, 2014
Google on Tuesday announced Project Zero, an effort to speed up the security bug-fixing process. A team of cybersecurity experts will go after vulnerabilities in any and all software, notify the vendors, and then file bug reports in a public database so users can track the issuance of patches. The Project Zero team has promised to send bug reports to vendors in as close to real-time as possible.
What's Eating Internet Security?
July 15, 2014
It's a given that hackers can and do penetrate websites with laughable ease, ranging from those of retailers to those of the United States government. It certainly doesn't help the security-minded to know that the U.S. National Security Agency and other countries' spy agencies, including the UK's GCHQ and the West German intelligence agency, are tapping into online communications at will.
Critical Infrastructure Companies Lack Cyberdefenses
July 11, 2014
Companies providing the world's critical infrastructure are woefully unprepared for cyberattacks despite the increasing threat level, evidenced by the release of the Stuxnet worm and the Shamoon virus in recent years, found a survey conducted by the Ponemon Institute and Unisys. Nearly 70 percent of the 599 surveyed companies in the past 12 months have reported at least one security breach.
Report: Malware Poisons One-Third of World's Computers
July 09, 2014
Nearly one-third of the world's computers could be infected with malware, suggests a report released last week by the Anti-Phishing Working Group. Malicious apps invaded 32.77 percent of the world's computers, a more than 4 percent jump from the previous quarter's 28.39 percent, it estimates. The increase in infected computers has come hand-in-hand with a jump in the appearance of malware samples.
NSA's Eyes Trained Less on Terrorists Than on Average Joes and Janes
July 07, 2014
Nine out of 10 people whose information is being collected by the NSA are Americans who have nothing to do with people targeted by the agency. Data provided by former NSA contractor Edward Snowden includes some information pertaining to terrorist activities and possible threats to U.S. national security, as well as a few successes in antiterrorist work.
Civil Liberties Board Takes Heat for NSA Spying Report
July 03, 2014
The U.S. Privacy and Civil Liberties Oversight Board has come under fire for its latest report on NSA surveillance. The report essentially says collection of information under Section 702 of FISA "has been valuable and effective in protecting the nation's security and producing useful foreign intelligence." However, because certain aspects of its implementation have raised privacy concerns.
Dragonfly Swoops Down on Energy Firms
July 01, 2014
The energy industry in the United States and Europe is being targeted by a cybercriminal gang that's suspected of being state-sponsored and has links to Russia. Known variously as "Dragonfly" and "Energetic Bear," the group has been operating at least since 2011. Its focus appears to be espionage and persistent access, with a side dish of sabotage as required, Symantec said.
Google Aims to Defrag Android Universe
July 01, 2014
As any Android user knows, the version you're using can vary widely because it depends on parties other than Google. That's why nearly two-thirds of users are running a version of Android introduced in 2012 or earlier. With Android making the leap to wearables and the Internet of Things, however, Google is aiming to make that kind of fragmentation a thing of the past.
Card Fraud Hits 1 in 4 Consumers Worldwide: Report
June 25, 2014
As many as a quarter of the world's consumers were victimized by card fraud in the past five years, and financial institutions are losing customers as a result, suggests a new study. ACI Worldwide and the Aite Group, which jointly surveyed more than 6,100 customers in 20 countries, found that 23 percent of consumers hit by card fraud changed financial institutions because they were dissatisfied.
To Pay or Not to Pay - That's the Ransomware Question
June 24, 2014
Ransomware is a growing problem for consumers and businesses alike. In Symantec's most recent quarterly security report, the company's researchers found all targeted attacks -- including ransomware -- grew 91 percent year-over-year. That's raising a big question for those targeted by cyberextortionists: Should the ransom be paid? Security experts generally say no, but some insert a caveat or two.
White House Tilts Toward Public-Private Cybersecurity Cooperation
June 23, 2014
The Obama administration and the private sector -- often at odds over the regulation of everything from telecom issues to software protection to the environment -- apparently agree that a major issue dealing with cybersecurity should be addressed on a cooperative basis, largely free of federal regulation. The White House recently signaled its tilt toward a cooperative and voluntary approach.
Godzilla Foreshadows Trouble for Internet of Things
June 16, 2014
The Internet of Things has come under attack by pranksters in recent days. The events could signal tumultuous things to come as more and more everyday objects connect to the Internet. Homeland Security has advised the customers of digital sign maker Daktronics to "take defensive measures" following a series of cyberpranks on the company's traffic signs.
Project Galileo Offers DDoS Protection for Free Expression Online
June 13, 2014
CloudFlare on Thursday announced the launch of Project Galileo, a service designed to provide enterprise-grade protection against distributed denial of service attacks free of charge to certain sites, with the goal of protecting freedom of expression on the Internet. CloudFlare is working with a number of partners to identify at-risk sites that qualify.
TrueCrypt's Mysterious Vanishing Act
June 02, 2014
Anyone would be distressed to discover the disappearance of a favorite piece of software, but when the software in question was open source and endorsed by Edward Snowden -- and when the developer's site begins offering instructions for migrating to a Microsoft product instead -- alarm bells are sure to begin ringing throughout the FOSS world. That, sure enough, is just what's been going on.
Iranians Caught Cyber Snooping on High-Value US Targets
May 29, 2014
A cyberespionage campaign with links to Iran for at least three years has been targeting U.S. military and congressional personnel, journalists and diplomats, as well as U.S. and Israeli defense contractors and members of the U.S./Israel lobby, according to a report released Thursday by iSight Partners. The spy ring used more than a dozen phony identities on online social networks.
Chinese Media: Cisco Is Playing on US Cyberspy Team
May 28, 2014
Cisco has been accused of being in bed with U.S. cyberspying efforts, according to a Chinese state media outlet. Cisco "carries on intimately" with U.S. spying apparatuses, the outlet claims, and plays "a disgraceful role" in efforts to prop up U.S. power over the Web. Cisco denied the accusations. Beijing definitely seems to have taken umbrage with last week's U.S. indictments for cyberespionage.

See More Articles in Cybersecurity Section >>
Facebook Twitter LinkedIn Google+ RSS