Bear with me, for now this will be a tiny post, a placeholder, but I am looking for feedback, ideas, comments and I will keep this post updated. The scenario: My local sandwich shop where I often hang out and work remotely has a wireless...Show More Summary
Google’s security chief has a simple definition of success: invisibility. “This is our desired outcome,” Stephan Somogyi said as a screengrab of a blank browser window appeared beside him: “absolutely nothing.“ In that half-hour presentation...Show More Summary
Three weeks after Sally Beauty first said it was looking into whether it’d been the victim of a hack attack, the company says it’s confirmed that criminals used malware on some of its point-of-sale systems, possibly exposing payment information for customers who used cards at some of its U.S. stores. Criminals deployed the malware at certain stores during “varying … [More]
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. Show More Summary
A collection of notable security news items for the week ending May 29, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Sally Beauty Holdings said malware was used on some of its point-of-sale systems in March and April.
CIRFU.Net domain bought on GoDaddy by "black-hat SEO" operator—malware hijinks ensue.
We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to acquire and disseminate viruses and the like on the fly. Speaking to this point, security researchers...Show More Summary
The Department of Justice has made a grave error as several seized Megaupload domains are now being exploited for nefarious purposes. A few days ago both Megaupload.com and Megavideo.com began directing visitors to scams and malware, presumably because the FBI's cybercrime unit lost control of the main nameserver. Show More Summary
Op-ed: Proposed restrictions on the export of malware could make the world less safe.
Even if you don't have cell phone service underground
While locking down cellular data and GPS connections on smartphones has always been the top security priority for manufacturers, it may be the overlooked motion sensors that provide the biggest window for hackers to spy on us. Researchers from Nanjing University have developed a technique that allows near-realtime tracking of unknowing subway riders. Show More Summary
Malware can infect IoT devices—including medical devices—with weak authentication.
Richard Stallman, known for his instrumental role in the creation of Linux, has written an opinion piece arguing that nearly any operating system you might use today can be considered malware, and that goes for popular mobile platforms as well as desktop operating systems. Show More Summary
The NitlovePOS malware spreads through phishing campaigns and extracts both track one and two payment card data.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. Show More Summary
Apple is reportedly working on a new security system for iOS and Mac called "Rootless," which will supposedly prevent malware and make it difficult to jailbreak the iPhone, according to a new report from 9to5Mac's Mark Gurman. Jailbreaking,...Show More Summary
A collection of notable security news items for the week ending May 22, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
If you download software programs regularly for Windows, you probably do your due diligence when it comes to making sure that the programs are safe and not malicious in nature. While you find lots of clean programs on the Internet for the operating system, there is probably an even greater number of infected programs out […] Ghacks needs you. Show More Summary