Archive

SPOTLIGHT ON SECURITY

Cyberattackers Brewed Special Malware Cocktail for South Korea

Cybersecurity news had a distinctive international flavor last week. In South Korea, a cyberattack from unknown sources disrupted portions of the nation's banking and broadcast industries. During the attacks, a North Korean Human Rights website based in Washington, D.C. was also defaced. Because of ...

Cyberattack Hammers Korean Banks, Broadcast Nets

Three banks and three broadcast networks in South Korea were hit Wednesday by a virus that froze their computers and shut down a related website. Seoul is looking into the attacks, but has declined to blame North Korea until investigations prove otherwise. It has boosted vigilance in the public and ...

SPOTLIGHT ON SECURITY

Phishers Cast Longlines to Hook More Victims

Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing. "The technique allows you to hit a lot of people very quickly and largely go undetected," said Dave Jevans, founder...

SPOTLIGHT ON SECURITY

China on Cyberattacks: US Is Pot Calling the Kettle Black

After taking it on the chin for its alleged attacks on U.S. media outlets -- and for its army reportedly backing hackers engaged in cyberespionage around the world -- China returned fire. The government claimed its defense and military ministries' websites are being bombarded with 144,000 hacking at...

ANALYSIS

Elevating Customer Service to the Next Level

Do you dread calling a company to get customer support? Most of us do. We are on hold forever and the problem drags on way too long, leaving brand loyalty damaged. Some companies are solving that problem by partnering with Support.com -- building customer loyalty, developing a competitive advantag...

SPOTLIGHT ON SECURITY

A Porous Perimeter Perplexes Security Pros

While it's a nasty pill to swallow for old-line security folks, the perimeter isn't what it used to be. The days when a company could hide behind its firewall and feel secure are gone. Pockets of resistance to that notion still exist, but the message is getting through to security pros. "It's a pain...

Joint Effort Snares Gang of Cyberthugs

Europol announced Wednesday the breakup of a gang of cybercriminals who allegedly ran a ransomware scheme to extract money from online users in 30 countries. Spanish police, working alongside Europol's European Cybercrime Center, made 11 arrests in an action dubbed "Operation Ransom." The cyberthiev...

SPOTLIGHT ON SECURITY

NYT Hack Shows Gaping Holes in Traditional Security Systems

After The New York Times and The Wall Street Journal revealed last week that their systems had been compromised by Chinese hackers, the Journal reported that the FBI has been probing attacks on U.S. media -- part of a long-running pattern by a "foreign entity" to compromise security at major U.S. co...

New York Times Exposes Chinese Hackathon

The New York Times reported on Thursday that it was the victim of a four-month cyberattack that originated in China. The intrusions may have been part of a shift by Chinese hackers to apply the same sophisticated infiltration techniques on foreign media that have been used in recent years to steal d...

Oracle’s Java Fix Fizzles

Oracle released a fix over the weekend for two serious vulnerabilities in Java, but this doesn't seem to have improved matters much. The vulnerabilities, which affect Web browsers using Java 7 plugins, let attackers remotely exploit target systems without needing a username or password. The U.S. Com...

GOVERNMENT IT REPORT

Federal Agencies Face Mobile Tech Catch-22

The fast pace of mobile technology development can improve the ways we share information almost overnight, with new applications and more powerful devices rolling out on a regular basis. Federal agencies, far from settling for the status quo normally associated with government, are trying to keep up...

FCC Unveils Smartphone Security Checklist

The Federal Communications Commission on Thursday launched a smartphone security checker website to help consumers ensure their devices are as secure as possible. The page lists various mobile operating systems and also points to a general checklist of actions users can take to secure their smartpho...

Offensive Viral Post Defaces Tumblr Blogs

The Tumblr microblogging, social networking and online sharing site was hit on Monday by a group that harasses blogs and practices Internet trolling -- the posting of provocative or off-topic messages online. The hackers created an offensive posting that propagated itself relentlessly on Tumblr's ne...

Many Hacks Claimed, Few Confirmed on Anon’s Day of Mayhem

Anonymous has been celebrating Guy Fawkes Day by engaging in various acts of mayhem online and turning out in person at sites across the globe to protest. Some of the reported hacks and other acts have turned out to be unsubstantiated. The attack claims include Symantec and ImageShack. PayPal also w...

Report: SMBs Overconfident on Cybersecurity

Small businesses in the United States are generally confident about their cybersecurity status, but they're wrong, according to a survey of 1,015 companies conducted for the National Cyber Security Alliance and Symantec. Apparently, SMBs aren't doing enough to keep their businesses safe and secure, ...

LinuxInsider Channels