Posts Tagged ‘cyber attacks’

USA - North KoreanNever before has a movie achieved more international attention, and it never even hit the screen.

White House spokesman Josh Earnest called the cyber attack at Sony, or the “Sony hack,” as it been named,  a destructive attack exposing serious security measures. To Hollywood and the rest of the country, it was a total surprise in many ways. U.S. Officials disclaimed that when foreign governments present attacks like this cyber attack, they are looking to provoke a response from the U.S. (more…)

White HatFor every bad hacker there’s a good one. Here we look at six white hat hackers who have contributed to security advances.

Despite gaining a less than desirable reputation, hacking has not always been the tool of evil.

White hat hackers – those technological boffins who use their skills to help others to improve their security – are just as prolific as black hat hackers. Here are six white hats you wouldn’t want to mess with. (more…)

G DataAnti-virus company revealed the new technology of cloud cyber attacks.

Experts in the field of computer security have identified a new way of carrying out cyber attacks based on the placement of the virus code in the cloud storage.

According to experts of G Data, the virus placed in the “cloud ” can be used to intercept data when making payment transactions over the Internet. So, for example, downloaded from the cloud of the malicious code may require the user to re-enter credit card information or personal data, which as a result will be in the hands of criminals.

According to this principle already has two well-known Trojan virus called Zeus and Ciavax. Unlike traditional viruses, which are located directly among the files stored on the computer, cloud viruses are much more difficult to detect and analyze and effective means of dealing with them is not there yet. (more…)

HackersA number of companies specializing in the protection of computer data, came to a sensational conclusion. Most cyber-attacks does not come from China, as is commonly believed, but from India. List of targets of these attacks varies from Pakistani government officials to the Chicago Mercantile Exchange.

As reported by The Wall Street Journal, a number of companies involved in the protection of personal computers, found that the common view of China as the main source of hacker attacks actually greatly exaggerated. The experts of these companies claim that most of these attacks come from the country, which is rarely remembered in connection with cybercrime – India.

According to the Norwegian company Norman Shark, who studied data on cyber attacks over the past three years, most of them have “no hell, which is issued to the Chinese track.” “On the contrary, we began to notice other patterns, such as the typical Indian names” – quoted analyst Snorre Fagerland of Norman Shark The Wall Street Journal. (more…)

Twitter hackedThe attack can be achieved by the introduction of Javascript code in your account page in the social network.

In one of the most popular social networks Twitter world was discovered malware aimed at social network users. This was reported by Tanya Shafir,  Trusteer’s researcher.

As declare in the company, the malicious software carries out MitB-attacks, using the web browser of the infected computers thanks to what get access to the account to Twitter from which the attackers and spread malicious entries. (more…)

Vulnerability

Security Threats for 2013

Experts corporations STONESOFT posted six top-security threats in 2013.

According to analysts in the come year the world community will face even more sophisticated a cyber attacks, a cyber espionage and hacking for the sake of the political and/or religious goals.

“We live in a digital world and issues of cyber-security is now for the international community more and more important. Each year, by the hour, the meaning of ‘information security’ is growing, and that means it’s time to think about the international rules, regulations and legislation in this area, “– says Jarno Limnell, director of Cyber ​​Security Corporation STONESOFT.

“The states actively invest in the their cyber opportunity. And, it is a question both of protection, and of attack. The quantity a cyber wars in the world will increase that can lead to serious consequences and unpredictable side effects. Consequences of any single attack can extend quickly worldwide, even by mistake. The infinite number of players is invested worldwide by huge amounts of money for change of existing kibir-reality”, – the expert emphasized. (more…)

Symantec Corp

Cyber threats 2013

The main part of cyber attacks will focus on smart phones, social networks and the government.

Researchers at Symantec presented their forecast of the threat of cyber security in the coming year. According to them, the main “victims” of malicious users and programs become mobile operating systems, social networks and government sites.

Experts point out that next year will be more aggressive attack and will serve to demonstrate the power. Despite the further spread of fraudulent schemes and espionage attacks, in the majority, will be political hue.

“Governments, organizations or special interests will use cyber attacks to demonstrate their power and to express themselves,” – said in Symantec. (more…)

Windows 8Despite the efforts of Microsoft customize build mechanisms to counter cyber threats, to better protect the user needs antivirus.

Experts in the field of information security is not very optimistic about took the news the update of security mechanisms in the operating system Windows 8 from Microsoft.

Despite the appearance of the OS Product Windows SmartScreen and Windows Defender, which, together with the earlier protection mechanisms should provide comprehensive user safety, the researchers note that the efforts made Microsoft is not enough. So, Windows SmartScreen is a means of protecting your computer from running unknown applications and files downloaded from the web, and Windows Defender – complete integrated Antivirus previously known as Microsoft Security Essentials.

Both decisions, according to the developer, to fully protect the user from a variety of cyber attacks, as Microsoft Security Essentials does not just accept the best of anti-virus solutions. (more…)

Malware Trojan HorseThe sixth version Citadel was discovered almost simultaneously with cyberattacks on computer systems of many banks.

The company announced a new RSA version Trojan Citadel, aimed at organizing the financial sector. Note that this version is the sixth in the series since the first detection of a trojan in January.

In RSA claim that the new version of the Citadel endowed a number of new features. The most important of these experts believe the dynamic configuration that allows administrators to set up botnets Citadel introduce malicious content into compromised browsers in real-time. Trojan dynamic makes it difficult to detect and allow malware to spread rapidly.

“Fraud today is carried out in real time, so speed is of the essence. This new feature allows operators to create web-Trojan injection and use them on the fly, giving them the path to the selected bots without having to load a new configuration file “, – said the representative of RSA Limor Kessem. (more…)

National Cyber Security AllianceIf we believe the study of National Cyber ​​Security Alliance (NCSA), conducted at the request of Symantec, 65% of small business owners believe that the Internet is an essential tool for success.

However, about a quarter of women who own their own business, questioned during “National Cyber ​​Security Awareness Month”, not sure of their protection against the risks associated with that environment. This is the conclusion reached by researchers insurer The Travelers Companies.

“Considering 40 percent of cyber attacks are against organizations with fewer than 500 employees3, it is imperative that we help small business owners understand cyber risks,”– said Marc Schmittlein, President and CEO of Small Commercial at Travelers. “As one of the nation’s largest insurers, we feel an obligation to help entrepreneurs prepare for and prevent cyber and other insurable risks as well as to recommend solutions to this important group of job creators and economic contributors.”

According to data obtained at the conference of the National Association of Women business, 42% of respondents do not believe that they have enough insurance to cover the costs if you have problems related to the protection of computer information. (more…)