Archive

Beware of Counterfeit Network Equipment

Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...

ANALYSIS

AI Raises the Bar for Home Network Security

Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks. Concerns about data security also have been shown to increase with ownersh...

Researchers Create Hack to Unlock Millions of Hotel Room Doors

A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with...

Norton Core Router Gives Home Security a New Design

Norton by Symantec on Tuesday announced the Norton Core secure router for smart devices in the connected home at CES. The router protects up to 20 PCs, Macs, Android and iOS smartphones and tablets on a home network, and unlimited devices connected to the IoT. It will update its firmware in backgrou...

Hacks Highlight Zuckerberg’s Cavalier Attitude Toward Security

Facebook top dog Mark Zuckerberg had several of his social media accounts breached and defaced, according to reports that surfaced Sunday. Zuckerberg's Twitter, LinkedIn and Pinterest memberships were hacked, but evidence of the attacks quickly disappeared. In addition to requiring passwords, Twitte...

Old-Timey Mischief on Display at the Malware Museum

The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...

SPOTLIGHT ON SECURITY

Report: Top Endpoint Security Packages Perfectly Foil Drive-By Attacks

Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice. A drive-by occurs when an infected website automatically down...

NSA’s Auroragold Mining Operation

The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with maj...

Turla Trojan Unearthed on Linux

Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has d...

Sony’s Cyber-Whodunit Is a Page-Turner

Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, t...

‘Elegant’ Regin Malware Linked to Brits, NSA

A sophisticated malware program called "Regin" has been used in systematic spying campaigns against a range of international targets since at least 2008, Symantec reported. Regin is a backdoor-type Trojan with a structure that displays a degree of technical competence rarely seen in malware, accordi...

Gallup Poll: Credit Card Hacking Could Happen to Me

Over the 4th of July weekend, 82 people were shot in Chicago, and at least 14 of them died from their wounds. For the year, there were 63 homicides in Oakland as of late October. Philadelphians logged 47 homicides in the first 64 days of this year, two more than were killed in New York City during t...

Microsoft Patch Blocks Sandworm Tunnels

iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If...

The Dark Side of BYOD

The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 were cle...

LinuxInsider Channels