New Malware Targeting POS System, ATMs Hits Major US Banks

Attackers Exploited Vulnerabilities in ATM Networks Connecting to Bank VPNs and GSM/GPRS Networks, Malware Infected ATMs and POS Systems to Steal Card Data.

A new malware targeting point-of-sale (POS) systems and ATMs has stolen payment card information from  several US banks, researchers say. The author behind the malware appears to have links to a Russian cyber-crime gang.

POS Malware

Called “Dump Memory Grabber”, the malware scans the memory of point-of-sale systems and ATMs looking for credit card ...

Continue Reading →
0

Three Mistakes Companies Make When it Comes to ‘Vulnerability Management’

By Mark Hatton

Vulnerability management has become a term that continues to be thrown around in security circles as a quick and easy path to threat remediation. However, the reality is that most companies are not actually managing vulnerabilities, but rather conducting scans that produce thousands of potential threats. Identifying possible security risks and actually managing them through to remediation are completely different things.

In its common definition, vulnerability management sounds like security utopia: if you purchase the right software, implement the proper ...

Continue Reading →
0

Intelligence and industry unite to fight cyber crime spies

Britain’s intelligence agencies will establish a Facebook-style site
to share cyber security secrets with industry experts to help combat
the growing terrorist threat, it emerged last night.
Intelligence and industry unite to fight cyber crime spies

Agents and analysts from MI5 and GCHQ will work side-by-side with private sector counterparts in a new government “fusion cell”.

Under the Cyber Security Information Sharing Partnership (CISP), private firms will be given access to a secure web portal, described as a ...

Continue Reading →
0

Competition Seeks Next Generation of Cybersecurity Experts

Cyber-aces

Think of it as an American Idol in which the contestants aren’t fighting for record deals but rather a pathway to joining the next generation of American offensive and defensive cybersecurity experts.

Meet Cyber Aces, a series of experimental state competitions that use a videogame to target participants with the right skills — a mixture of a deep understanding of networking, operating systems and systems administration — to ...

Continue Reading →
0

Largest ever DDoS attack detected

The largest Distributed Denial of Service (DDoS) attack ever reported is affecting internet access around the world, according to several reports.

The DDoS attack, which began on around 15th March, is directed against Spamhaus, a non-profit organisation that provides blacklists of IP addresses alleged to be distributing spam messages. Spamhaus has accused a Dutch hosting service provider CyberBunker, of initiating the attacks along with eastern European cybercriminals, after Spamhaus listed CyberBunker ...

Continue Reading →
0

DarkSeoul: SophosLabs identifies malware used in South Korean attack

 SophosLabs has identified the malware used in the major internet attack that hit systems
in South Korea earlier today.

Whois team

Computer networks belonging to South Korean TV broadcasters and at least two major banks in the country have been disrupted by what some have suggested was a malicious internet attack orig Continue Reading →
0

South Korea data-wipe malware spread by patching system

Long dark teatime in Seoul saga continues to unfold

By John Leyden

South Korea’s data wiping malware that knocked out PCs at TV stations and banks earlier this week may have been introduced through compromised corporate patching systems.

Several South Korean financial institutions – Shinhan Bank, Nonghyup Bank and Jeju Bank – and TV broadcaster networks were impacted by a destructive virus (since identified as DarkSeoul by Sophos and Jokra Trojan by Symantec), which wiped the ...

Continue Reading →
0

South Korea network attack ‘a computer virus’

SEOUL – South Korea was hit by a major cyber attack Wednesday as the computer systems of two major banks, three broadcasters and others simultaneously crashed, raising suspicions that North Korea was to blame.

On some computer screens, images of skulls with glowing red eyes popped up along with cackling laughter.

Blank computer screens at YTN broadcaster, Seoul. 20 March 2013

Although it appears the attack, which began about ...
Continue Reading →
0

Cyberattack leaves natural gas pipelines vulnerable to sabotage

A government report says a cyberattack against 23 natural gas pipeline operators stole crucial information that could compromise security. Experts strongly suspect China’s military.

Cyberspies linked to China’s military targeted nearly two dozen US natural gas pipeline operators over a recent six-month period, stealing information that could be used to sabotage US gas pipelines, according to a restricted US government report and a source familiar with the government investigation.

From December 2011 through June 2012, cyberspies targeted 23 gas pipeline companies with e-mails crafted to ...

Continue Reading →
0

Oracle releases emergency fix for Java zero-day exploit

The company broke out of its regular patching cycle for the second time
this year to fix an actively exploited flaw

Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks.

The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are located in the 2D component of Java and received the highest possible impact score from Oracle.

“These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited ...

Continue Reading →
0
Page 6 of 11 «...45678...»