Monthly Archives: October 2012

Nuclear power plant cybersecurity warnings silenced by legal threats

Nuclear power plant cybersecurity warnings silenced by legal threats

One vendor's threat to sue has resulted in two canceled talks about a nuclear power plant's potential vulnerabilities to cyber-attack.

Free iPad Mini scam spreads via Facebook rogue application

Free iPad Mini scam spreads via Facebook rogue application

Facebook users are being targeted in a scam that offers them the opportunity to get their hands on a free iPad Mini.

Counterattack! Suspected hacker caught on HIS WEBCAM, while spying on Georgia

Counterattack! Suspected hacker caught on camera, while spying on Georgia

The Georgian government's CERT (Computer Emergency Response Team) claims it has linked an internet attack to Russia's security services, and even turned the tables on a hacker it believes was involved by secretly taking over his computer and taking video footage of him.

Whodunnit? Conflicting accounts on ARAMCO hack underscore difficulty of attribution

Whodunnit? Conflicting accounts on ARAMCO hack underscore difficulty of attribution

A recent report suggests that the devastating cyber attack that wiped out thousands of computers belonging to Saudi Arabia's national oil company was the work of a lone hacker - days after the US Secretary of Defense cited it as an example of a state sponsored attack.

What do we really know?

Are you ready for International Kill A Zombie Day, 2012?

Are you ready for International Kill A Zombie Day, 2012?

Forget trick-or-treating, use the excuse of Halloween to exterminate some zombie computers instead!

Yahoo! rejects privacy arguments, ignores do not track from IE 10 users

Yahoo! rejects privacy arguments, ignores do not track from IE 10 users

Yahoo! has decided to ignore Internet Explorer 10 users privacy choices. Are IE 10 users losing out on a tailored advertising experience?

Windows 8 security overview - Safest Windows ever?

Windows 8 security overview - Safest Windows ever?

Windows 8 is now available and Microsoft is touting the entirely new user interface and app store. What security enhancements were made over Windows 7 and are these changes reason enough to upgrade?

"STD-like" virus killing off Borderlands 2 video game characters

"STD-like" virus killing off Borderlands 2 video game characters

Gearbox, the maker of the popular game Borderlands 2, is warning Xbox 360 users to be careful of who they play with, following a rash of reports of unexplained character deaths.

The culprit: a software flaw that appears to be spreading, "STD-like", from Borderlands 2 "modders" to other law-abiding players.

Attacker grabs data for 3.6 million South Carolina taxpayers; governor wants to see culprit "brutalized"

Attacker grabs data for 3.6 million South Carolina taxpayers; governor wants to see culprit "brutalized"

She's got a right to be incensed, with 77% of the state's population's Social Security numbers being snatched out from under the Department of Revenue. But what's the appropriate penalty for the department, for the crime of leaving the data unprotected?

Phishing attack promises a free version of Windows 8

Phishing attack promises a free version of Windows 8

On Friday, Microsoft launched Windows 8 to consumers.

Today, the experts at SophosLabs have intercepted a phishing attack which plays upon interest in the new operating system.

US EMP missile fries PCs and electronics in trial run of microwave weapon

US EMP missile fries PCs and electronics in trial run of microwave weapon

Sci-fi turns real as the Boeing and the US Air Force test a drone-like, experimental weapon that targets electronics while sparing buildings and human lives. It sounds too good to be true, which it well might be, given the range of mishaps that have plagued US drones.

Monday review: the hot 20 stories of the week

Monday review: the hot 20 stories of the week

Here you go. All the stories we wrote in the past seven days, in case you missed anything (or just want to read them again).

Security scare after airline boarding passes reveal how passengers will be screened

Boarding passes tell passengers how they'll be screened

The US Transportation Security Administration (TSA) already has a pretty poor record with security experts. The news this week that the agency was tipping its hand by encoding how it planned to conduct passenger screening in boarding passes isn't helping that.

Blackhole malware attack spread via 'Your photos' email

blackhole-thumb

A malware attack has been spammed out widely via email to internet users, posing as a message about photos.

Duck talks security on Risky Business

Duck talks security on Risky Business

Naked Security's Paul Ducklin talks to the Risky Business podcast about Oracle's patching schedule, lawsuits against Sony after the PlayStation Network breach and how a mathematician unpicked Google's DKIM verifier.

Six critical vulnerabilities in Adobe Shockwave patched

Six critical vulnerabilities in Adobe Shockwave patched

If your Windows or Mac computer uses the Adobe Shockwave Player, it's time to update your systems.

National security threat or not? Huawei offers Australia unrestricted access to code

Huawei offers Australia unrestricted access to code

The company blames its own poor communications for what it calls "myths and misinformation" that have led to multiple countries banning its equipment.

But reports of Huawei's almost-sale of banned telecom equipment to Iran underscores fears that the company is sloppy at best, a vector for cyber attack at worst.

Should you lie on Facebook? [VIDEO]

Should you lie on Facebook? [VIDEO]

A senior government official has advised users of social networks such as Facebook on how to better protect their privacy.

Don't tell social networks the truth.

IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims

IP theft attacks can hide on networks for years, without the knowledge of corporate victims, report claims

Organizations in the financial services and public administration sectors are the primary targets of sophisticated attacks aimed at stealing intellectual property, with attacks involving both external and internal agents and lasting for months or years, according to a new report from Verizon.