IBM warns companies to block Tor network

or face corporate ransomware and DDoS attacks

IBM is warning companies to block access to the Tor anonymising network, as cybercriminals are targeting corporations for ransomware and DDoS attacks (Reuters)

IBM is warning companies to stop using the Tor anonymising network and completely block it from corporate networks to avoid being open to increasing ransomware and distributed denial of service (DDoS) attacks.

In a new threat intelligence report, IBM says that targeted ransomware is on the rise and that cybercriminals are increasingly making ...

Continue Reading →
0

Phishing Security Awareness

Beware-Of-Phishing

Phishing Definition 

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well-known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSNForex, BestBuy, ...

Continue Reading →
0

Community Health Systems data hack hits 4.5 million

Community Health Systems has 206 hospitals across the US

A major US hospital group said it was the victim of a cyber-attack resulting in the theft of 4.5 million people’s personal data.

The attack, which Community Health Systems believed originated in China, happened in April and June this year.

The data included patient names, addresses, birthdates, telephone numbers and social security numbers.

The firm, which runs 206 hospitals in 29 states, is now in the process of notifying affected patients.

One security expert warned that ...

Continue Reading →
0

Microsoft releases hacker-busting Enhanced Mitigation Experience Toolkit

 

Microsoft has released an updated version of its Enhanced Mitigation Experience Toolkit 5.0  (EMET), marking its latest bid to protect its corporate customers from hackers.

EMET 5.0 is available from Microsoft now and adds a wealth of improved features. Key updates include an upgraded Attack Surface Reduction (ASR) tool designed “to limit the attack surface of applications and reduce attacks”, and Export Address Table Filtering Plus (EAF+) service, that will “improve and extend current EAF ...

Continue Reading →
0

USB Device Under Threat. New Hack Is Undetectable And Unfixable

 

USB devices such as mice, keyboards and thumb-drives can be used to hack into personal computers in a potential new class of attacks that evade all known security protections.

CSE Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.

Hacked USB2

The finding shows that bugs in software used to ...

Continue Reading →
1

Swiss Telecom Plans Switzerland Cloud

Switzerland to set up ‘Swiss cloud’ free of NSA, GCHQ snooping (it hopes)
Gnomes of Zurich want spook-immune system

Swisscom, the Swiss telco that’s majority owned by its government, will set up a “Swiss cloud” hosted entirely in the land of cuckoo clocks and fine chocolate – and try to make the service impervious to malware and uninvited spooks.

Companies providing secure communications, such as Silent Circle, already use Swiss data centers because the country has very tight data privacy laws. And surveillance ...

Continue Reading →
0

Ploutus ATM Malware May be Spreading to US

ATM malware may spread from Mexico to English-speaking world
Attacker can command an unidentified ATM brand to empty cash cassettes
through keypad commands
By Jeremy Kirk
IDG News Service – A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.

Two versions of the malware, called Ploutus, have been discovered, both of which are engineered to empty a ...

Continue Reading →
0

Vulnerabilities in some Netgear router and NAS products open door to remote attacks

Attackers can compromise the devices with a single HTTP request that doesn’t require authentication

IDG News Service – Vulnerabilities in the management interfaces of some wireless router and network-attached storage products from Netgear expose the devices to remote attacks that could result in their complete compromise, researchers warn.

The latest hardware revision of Netgear’s N600 Wireless Dual-Band Gigabit Router, known as WNDR3700v4, has several vulnerabilities that allow attackers to bypass authentication on the router’s Web-based interface, according to Zachary Cutlip, a ...

Continue Reading →
0

Brazil to fortify government email due to NSA revelations

Federal Data Processing Service has been tasked with making
a secure email system for federal government

IDG News Service – The Brazilian Federal Data Processing Service, known as Serpro, will build a secure email system for Brazil’s federal government following media reports that foreign intelligence agencies intercepted electronic communications in the country.

Via several Twitter posts on Sunday, Brazil’s President Dilma Rousseff said that creating a secure email system for the federal government is the first step to increase the privacy and ...

Continue Reading →
0

Shortage of Cyber Security Professionals Felt Worldwide

Cyber defenders are in short supply as hacking wars escalate

 
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. REUTERS/Kacper Pempel/Files
© Kacper Pempel / Reuters
LONDON (Reuters) – For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.

Hostile computer activity from spies, saboteurs, competitors and criminals has spawned a growing industry ...

Continue Reading →
0
Page 1 of 11 12345...»