Posts Tagged ‘Malware’

Your employees aren’t the only threat to InfoSec and Compliance

July 22nd, 2013 by Lewis Morgan  I overheard a conversation the other day, one which left me so stunned that I’ve decided to write about it…. Two men having dinner behind me (I got the impression they were both directors) were discussing the £200k fine the NHS received for losing patient data. Eventually, the conversation […]

Leave a Comment

Controls against industrial Malware

Malicious software is called a malware and malware may include viruses, worms and trojans. A virus is a piece of code which is capable of replicating itself and mainly it depends on a host file (a document) to reach its target. However worm does not rely on the host file to reach the target but […]

Leave a Comment

10 reasons to ponder before using your smartphone for banking

  Mobile Payment Security 01) There is no clear legislation that sets out your rights to receive a refund if your bank account is fraudulently emptied due to mobile bank app insecurity. The burden of proof seems to be on the user to protect their handset, operating system, software, mobile operator infrastructure and everything else […]

Leave a Comment

The Rise of Malicious Traffic on Networks and how it Infect

  Sophisticated malicious attacks can go largely undetected by most antivirus software.  Defense in depth approach requires organizations to monitor for malicious activity, malware (bot traffic) at various levels of the network, perimeter layer, application level and subsequently at critical data level. How an end user might become infected, the obvious scenario being possibly our […]

Leave a Comment

Phishing emerges as major corporate security threat

Source: Computer World The successful use of phishing emails to breach secure organizations like Oak Ridge National Laboratory and RSA are stark reminders of the serious threat posed by what some experts have dismissed as as a low-tech method of attack. Oak Ridge, a U.S. Department of Energy-run research lab, this week disclosed it had […]

Comments (3)

Biggest mobile malware threat

Image via CrunchBase Facebook is biggest mobile malware threat, says security firm Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware By Joan Goodchild -CSO The biggest mobile infection threat isn’t malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets […]

Leave a Comment

The Basics of Stuxnet Worm and How it infects PLCs

Image by biatch0r via Flickr Considered to be the most intricately designed piece of malware ever, Stuxnet leverages attack vectors onto industrial control systems, a territory rarely ventured into by traditional malware. Stuxnet targets industries, power plants and other facilities that use automation and control equipment from the leading German industrial vendor, Siemens. The term, […]

Comments (1)

New virus threatens phones using Android

Image via Wikipedia Mobile Malware Attacks and Defense WASHINGTON (AFP) – A virus infecting mobile phones using Google’s Android operating system has emerged in China that can allow a hacker to gain access to personal data, US security experts said. A report this week from Lookout Mobile Security said the new Trojan affecting Android devices […]

Leave a Comment

Stuxnet, world’s first “cyber superweapon,” attacks China

Image by toastiest via Flickr Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran’s nuclear facilities — especially that country’s centrifuge farms and the nuclear reactor […]

Comments (1)

8 tips for safer online shopping

Image by Matthieu Dejardins, eCommerce Activist via Flickr By Microsoft.com Online threats today come in the form of attacks on you and attacks on your computer. Here are eight (8) ways for you to have a safer online shopping experience: 1. Keep your computer software up to date. Keep all software (including your web browser) […]

Leave a Comment

Spam, malware proliferate in late 2009

Image by colodio via Flickr Alejandro Martínez-Cabrera Online security firm Websense has released a report on the cyberthreat landscape during the second half of 2009, and some of the findings are jaw dropping: The firm, which scans millions of Web sites and e-mails a day looking for malicious content, found that 95 percent of all […]

Leave a Comment

Pop-Up Security Warnings Pose Threats

Image by Travelin’ Librarian via Flickr Malware: Fighting Malicious Code By FBI NPO The FBI warned consumers today about an ongoing threat involving pop-up security messages that appear while they are on the Internet. The messages may contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. […]

Comments (2)

Hackers’ attacks rise in volume, sophistication

Year in review for online security attacks – 2009 is going to be known as a year of change in tactics of exploitation, rather than creating more new tools in hacker’s community. They are utilizing social media as a tool to exploit and using built-in trust in social media to their advantage. That’s why stealing […]

Leave a Comment

Viruses That Leave Victims Red in the Facebook

Image by Intersection Consulting via Flickr By BRAD STONE – NYTimes.com It used to be that computer viruses attacked only your hard drive. Now they attack your dignity. Malicious programs are rampaging through Web sites like Facebook and Twitter, spreading themselves by taking over people’s accounts and sending out messages to all of their friends […]

Comments (2)

Five ways to lose your identity

By Jaikumar Vijayan The rush by shoppers to the Web makes the season a great time for online retailers. It’s also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online. Checkout huge savings on Today’s Hot Deals on Information Security Solutions for […]

Comments (1)