SungardASVoice: Why Securing The Network Alone Is Wrong

by Sue Poremba When talking about the latest “worst breach ever” event, people usually use the words like “sophisticated” or “complicated.” And while there is no doubt that cybercriminals have come up with more sophisticated and complicated schemes to steal valuable information off the network (anybody’s network), they tend to rely on rather simple entry points: […]

Leave a comment Continue Reading →

Researcher: Mac computers vulnerable to bootkit attack via Thunderbolt port

By Paul Mah A researcher is set to demonstrate a method in which a hacker could use a specially crafted Thunderbolt device to inject a bootkit malware into the EFI ROM of any Mac computer that is equipped with a Thunderbolt port. In a nutshell, Trammell Hudson took advantage of a flaw in the Thunderbolt […]

Leave a comment Continue Reading →

Why the Security of USB Is Fundamentally Broken

BY ANDY GREENBERG 07.31.14 | 3:00 AM | PERMALINK Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB […]

Leave a comment Continue Reading →

The ultimate heist: Hackers use SMS to get ATMs to pump out cash

BY BEN ZIGTERMAN ON MAR 25, 2014 AT 2:50 PM Microsoft is dropping support for Windows XP on April 8th, and with 95% of all ATMs still running XP, this could become a major problem for any banks that haven’t signed agreements to keep support running past the deadline. And today, we learned of an […]

Leave a comment Continue Reading →

Cash machines raided with infected USB sticks

By Chris Vallance BBC Radio 4 Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year. The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank’s cash dispensers […]

Leave a comment Continue Reading →

First Android bootkit has infected 350,000 devices

January 24, 2014 Russian anti-virus company Doctor Web is warning users about a dangerous Trojan for Android that resides in the memory of infected devices and launches itself early on in the OS loading stage, acting as a bootkit. This allows the Trojan to minimize the possibility that it will be deleted, without tampering with […]

Leave a comment Continue Reading →

Target credit card data was sent to server in Russia

The data was quietly moved around on Target’s network before it was sent to a US server, then to Russia By Jeremy Kirk | Published: 01:50, 17 January 2014 The stolen credit card numbers of millions of Target shoppers took an international trip — to Russia. A peek inside the malicious software that infected Target’s […]

Leave a comment Continue Reading →

Stuxnet infected Russian nuclear plant

By Darren Pauli on Nov 8, 2013 9:18 PM Filed under Networks Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz. The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium […]

Leave a comment Continue Reading →

Its Time to Secure Mobile Devices, Not Just Manage Them

by Wade Williamson on November 05, 2013 As part of my job, I spend a good deal of my waking hours thinking about information security and sharing my findings with IT security practitioners. What are the latest techniques we see from attackers, and what sorts of techniques or policies work best to mitigate them? And […]

Leave a comment Continue Reading →

Researchers successfully bypass Windows 8 Secure Boot

Published on FierceCIO:TechWatch (http://www.fiercecio.com/techwatch) August 2, 2013 | By Paul Mah Security researchers at Black Hat demonstrated a couple of ways in which they were able to circumvent the Secure Boot feature in Windows 8 to install a boot rootkit on a Unified Extensible Firmware Interface equipped computer. The first exploit was demonstrated on an […]

Leave a comment Continue Reading →
Twitter widget by Rimon Habib - BuddyPress Expert Developer