TrendLabs - Malware BlogThe recent attacks on New York Times, Twitter and others while DNS-related, were not the result of a weakness in the DNS at all. They resulted from weaknesses in domain registrar infrastructure. The DNS components related to this event performed exactly as they were designed and instructed to do. While it is true that the […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNYT/Twitter Hacks Show DNS Is Not Broken, But Domain Registrars Might Be
Krebs on SecurityA hacking group calling itself the Syrian Electronic Army (SEA) has been getting an unusual amount of press lately, most recently after hijacking the Web sites of The New York Times and The Washington Post, among others. But surprisingly little light has been shed on the individuals behind these headline-grabbing attacks. Beginning today, I'll be taking a closer look at this organization, starting with one of the group's core architects.
Trend Micro - Security IntelligenceRecently, security researchers disclosed two Java native layer exploits (CVE-2013-2465 and CVE-2013-2471). This caused us too look into native layer exploits more closely, as they have been becoming more common this year. At this year’s Pwn2Own competition at CanSecWest, Joshua Drake showed CVE-2013-1491, which was exploitable on Java 7 running on Windows 8. CVE-2013-1493 has […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroJava Native Layer Exploits Going Up
TrendLabs - Malware BlogRecently, security researchers disclosed two Java native layer exploits (CVE-2013-2465 and CVE-2013-2471). This caused us too look into native layer exploits more closely, as they have been becoming more common this year. At this year’s Pwn2Own competition at CanSecWest, Joshua Drake showed CVE-2013-1491, which was exploitable on Java 7 running on Windows 8. CVE-2013-1493 has […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroJava Native Layer Exploits Going Up
Sophos - Naked SecurityAre you worried about what your child is up to on social media? Well, if you live in Southern California, you may have a few extra people watching your child's back.
CSO OnlineDo you shop online? Of course you do—this is 2013. Who hasn’t bought a few things from Amazon by now? In fact, e-commerce is a huge business projected to rake in $1.2 trillion—with a “T”—in revenue this year.
Sophos - Naked SecurityA US District Judge, Richard Seeborg, ruled on Monday that Facebook must pay out a total of $20 million over its Sponsored Stories adverts. The settlement is the conclusion to a class action lawsuit brought over two years ago over the social networking giant's use of members' names and pictures without consent.
Surprise! First ever Facebook "Government Requests" report reveals the most inquisitive authorities...Sophos - Naked SecurityFacebook has released its first ever Global Government Requests Report, listing all the national authorities that have requested access to information on its users.
Don't want "the man" to know about it? Don't share it!
Sophos - Naked SecurityGoogle's domain serving the Palestinian territories, Google Palestine, was hijacked on Monday by hackers urging Google to rename Israel to Palestine in Google Maps (and the rest of us to listen to Rihanna).
Sign up now »
Kaspersky Open Space Security provides complete business protection in a single integrated suite of applications that work seamlessly across all platforms.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.