OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
Turla Trojan Unearthed on Linux
December 09, 2014
Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has discovered two variants of the malware running on Linux.
Sony's Cyber-Whodunit Is a Page-Turner
December 05, 2014
Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, the FBI has issued a warning stating destructive malware is on the loose.
Cybersecurity Threats 2015: More Espionage, More Apple Malware
December 03, 2014
Cyberspies will flourish and hackers will target Apple devices more often in 2015. Until now, Russia, China and the United States have dominated the cyberespionage scene, but their success will start to attract new players to the practice. "We can expect some of the developing economies ... to engage in these activities to protect their growth status," said Websense's Carl Leonard.
Did North Korea Get the Last Laugh Against Sony?
December 02, 2014
Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. It's rumored that the hack was launched by North Korea.
'Elegant' Regin Malware Linked to Brits, NSA
November 25, 2014
A sophisticated malware program called "Regin" has been used in systematic spying campaigns against a range of international targets since at least 2008, Symantec reported. Regin is a backdoor-type Trojan with a structure that displays a degree of technical competence rarely seen in malware. "It's a beautiful piece of architecture," said Scott Borg, CEO of the U.S. Cyber Consequences Unit.
Wristband Heads Off Password Headaches
November 25, 2014
Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If so, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wristband that removes the need to remember the countless log-in credentials we use every day.
EFF Spearheads Safer Web Initiative
November 24, 2014
The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTTPS protocol. EFF is partnering with Akamai, Mozilla, Cisco, iDenTrust and University of Michigan researchers.
NotCompatible Mobile Malware Gets Badder
November 21, 2014
A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. The NotCompatible Trojan is used to spread spam campaigns, among other nefarious activities.
Citadel Trojan Adds Keylogging to Arsenal
November 21, 2014
Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begins capturing keystrokes, or keylogging, when some processes are running. It was discovered on a server that already had been infected.
China Suspected in Attacks on USPS, NOAA
November 19, 2014
The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk includes names, date of birth, Social Security numbers, addresses and dates of employment.
Researchers Shine Spotlight on OS X/iOS Masque Attack
November 12, 2014
Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except those preinstalled on iOS, such as Mobile Safari, can be replaced.
USPS Employees, Retirees, Customers Exposed in Hack Attack
November 11, 2014
Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. The personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment and emergency contact information -- of more than 800,000 employees and some retirees has been exposed.
Apple-Pestering WireLurker Banished for Now
November 07, 2014
Palo Alto Networks on Wednesday reported that more than 400 apps infected with a malicious program it calls "WireLurker" have been downloaded 356,104 times by Chinese Mac owners from Maiyadi, an online app store unaffiliated with Apple. The malware does no harm to the Macs it infects but when the computer connects via USB to an iOS device -- an iPhone or iPad -- it delivers its malicious payload.
Russian Cyberspies Caught With Mittens in Cyber Cookie Jar
November 06, 2014
Russian cyberspies -- unlike their Chinese counterparts -- have a reputation for stealth, so it's unusual when two digital espionage operations linked to the Kremlin come to light in a week. FireEye early last week released a report detailing how hackers working for the Russian government have been using sophisticated techniques over a seven-year period to penetrate computer systems.
The Long and Winding Road to Shellshock Recovery
October 29, 2014
Four days after Shellshock was disclosed, Incapsula's Web application firewall deflected more than 217,000 attempted exploits on more than 4,100 domains. The company recorded upwards of 1,970 attacks per hour, from more than 890 IPs around the world. Shellshock was expected to be far worse than the Heartbleed flaw, which was expected to impact about 17 percent of the secure Web servers worldwide.
Mobile Malware Takes Victims by Surprise
October 28, 2014
Malware writers behind Koler, a bad app that attacks Android devices, have upped their game with a new variant of the pernicious program. In its original version, Koler hijacked phones it landed on and wouldn't set them free until a ransom was paid. This latest strain of the malapp also does the ransomware thing, but it takes its malignancy a step further.
Staples May Be Next to Wear Data Breach Scarlet Letter
October 21, 2014
Yet another major retailer -- this time, office supply chain Staples -- reportedly has fallen victim to a data breach. More than half a dozen banks operating on the East Coast have seen fraudulent charges made at non-Staples businesses, such as supermarkets and other big-box retailers, by people using Staples cards. Those cards apparently were used previously at three Staples stores in the area.
Microsoft Patch Blocks Sandworm Tunnels
October 17, 2014
iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If exploited, the flaw will let attackers remotely execute code on target systems.
Kaspersky Probes ATM Malware Mystery
October 10, 2014
Kaspersky Lab this week reported that criminals have been emptying ATMs and infecting them with malware dubbed "Tyupkin." About 50 machines have been infected in eastern Europe, and the attacks have spread to the United States, India and China, based on statistics culled from VirusTotal, Kaspersky said. The attackers target ATMs running Windows 32-bit operating systems.
Phishers Find Apple Most Tasty Target
October 07, 2014
"Follow the money" isn't just the war cry of journalistic bloodhounds hot on the trail of political corruption. It's the mantra of Web predators, too. That's why PayPal consistently has been the top brand targeted by phishers -- although that appears to have changed. Apple now has the dubious distinction of most-phished brand, according to the latest report from the Anti-Phishing Work Group.
EFF Raises Alarm Over ComputerCOP's Spying Ways
October 02, 2014
ComputerCOP software, a parental monitoring application that long has been recommended and distributed by law enforcement agencies, is little more than spyware with significant potential for abuse, the EFF reported Wednesday. The software includes a keylogger that could expose a family's personal information by transmitting what's typed to third-party servers without encryption, the EFF said.
Banks, Businesses Scramble to Smash Bash Shellshock Bug
September 29, 2014
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability could be used to inject malicious code or take command of a system or device. Dubbed "Shellshock," it requires patching systems and devices running Apple's OS X, Linux and Unix.
Bash Shellshock Bug Patched but Not Pummeled
September 25, 2014
Researchers on Thursday discovered proof-of-concept code that could take advantage of unpatched computer systems, and found evidence of attacks exploiting the BASH Shellshock bug in the wild. Shellshock, which came to light on Wednesday, could become a major threat to Linux/Unix and Apple operating systems if published patches to BASH are not applied before an attacker cashes in.

See More Articles in Malware Section >>
Facebook Twitter LinkedIn Google+ RSS