Powered By Blogger

Sunday, 11 March 2012

Latest Windows Security blog posts




Is Sabu a martyr or a traitor?
Date - Mar 9th, 2012
Author - George Chetcuti
Even the smart ones make mistakes! The hacker community is still in disbelief that one of their own could possibly turn against them. However, a hacker tells FoxNews.com that he sees Sabu as a martyr - "He is taking one for the team, protecting the community by sacrificing himself," Last August, the hacker Sabu who is regarded as a leader in the hacking community was arrested, and charged with several counts of computer fraud. more...
Google Chrome falls first at Pwn2own!
Date - Mar 8th, 2012
Author - George Chetcuti
A team of security experts from France managed to hack Google's Chrome during the first five minutes of this year's Pwn2Own contest. more...
Is Gmail sending "spam" in your name?
Date - Mar 7th, 2012
Author - Debra Shinder
Many businesses today are having employees use Gmail for business related communications instead of maintaining their own mail servers. It certainly saves the company money, but will you end up with some unexpected (and unwanted) “fringe benefits?” Some Gmail users have been complaining that messages are being sent in their names, attempting to get their contacts to use Google products. more...
Employers 'right to view job seekers' Facebook pages
Date - Mar 7th, 2012
Author - Debra Shinder
You knew it was bound to come to this: Now potential employers are trying to use social networking to help in the process of vetting potential employees. more...
Cyber Atlantic 2011
Date - Mar 6th, 2012
Author - George Chetcuti
Cyber Atlantic 2011 was the first joint cyber security exercise between member states of the European Union and the United States. In the exercise both sides simulated a cyber-crisis scenario to explore EU–US engagement and cooperation in the event of cyber-attacks on their critical infrastructures. Standard Operating Procedures were introduced and tested! Read the exercise evaluation report here - http://www.enisa.europa.eu/activities/res/ca2011/ca2011-report . more...
Anonymous hacked?
Date - Mar 5th, 2012
Author - George Chetcuti
A report published last week by Symantec, give details how members who participated in DDoS attacks in support of Anonymous may have been deceived into downloading a Zeus Trojan that exposes personal information including banking details! The link to the DDoS tool is found in a guide advertised by Anonymous so that members can download and participate in these attacks. more...
Free malware analysis service
Date - Mar 2nd, 2012
Author - George Chetcuti
A free malware analysis service offered by The Shadowserver Foundation allows you to analyze suspicious files and extract information on their process and network behavior while being executed. Malwr.com is built on top of an open source malware analysis system called Cuckoo Sandbox, which is developed and maintained by the same people. The benefits of Malwr.com are: •    It's free. •    It's independent from any security vendor. more...
25 Hacktivists Arrested!
Date - Mar 1st, 2012
Author - George Chetcuti
The 25 suspects, who were involved in cyber-attacks and arrested last Tuesday, will be charged if investigators manage to decipher the data from the confiscated equipment, according to an article published by Associated Press. more...
Security in the Cloud: What's it all about?
Date - Feb 29th, 2012
Author - Debra Shinder
According to Thor Olavsrud, it’s all about visibility and control. But what does that mean, exactly? Even though security is a major concern for enterprises and small businesses alike when it comes to cloud computing, a recent survey showed that only about 29 percent of companies said they engaged in heavy or comprehensive review of the cloud service providers’ security practices. more...
Malware is using DNS to avoid detection
Date - Feb 29th, 2012
Author - Debra Shinder
Attackers have taken to using the Domain Name System (DNS) to communicate with their botnets, rather than more traditional avenues such as TCP and HTTP. That’s because you can generally detect the malicious traffic going through those protocols with your firewall or IDS/IPS. That’s harder to do with DNS traffic, because it doesn’t normally get inspected or filtered. more...

No comments:

Post a Comment