Articles In Uncategorized

By Nancy Rand, Posted in Uncategorized

February 20, Help Net Security – (International) Microsoft issues Fix it for critical IE 0-day exploited in attacks. Microsoft released a security advisory and a Fix it tool temporarily mitigating the IE zero-day vulnerability actively exploited in attacks in the wild until a patch is released. Source: February 20, IDG News Service – (International) Cisco fixes flaws in several products. Cisco Systems released security updates addressing serious vulnerabi... read more.

  • February 24, 2014

By Nancy Rand, Posted in Uncategorized

February 19, – (International) Microsoft crash reports reveal Houdini hack campaign hitting firms. A security researcher from Websense found a new hack campaign utilizing the Houdini remote access trojan (RAT) targeting a mobile network operator and government body while cross-referencing Microsoft application and software crash reports. Source: February 19, Network World – (International) Z... read more.

  • February 20, 2014

By Nancy Rand, Posted in Uncategorized

February 18, Help Net Security – (International) Linksys announces firmware fix to neutralize “The Moon” worm. Linksys announced that they were aware of “TheMoon” malware targeting its older routers and are working on a firmware fix, but advised administrators and users to Disable Remote Administration of their devices in order to protect themselves from the attack. Source: February 17, Help Net Security – (International) Kickstarter suffers data breac... read more.

  • February 19, 2014

By Nancy Rand, Posted in Uncategorized

February 14, Softpedia – (International) IE zero-day served by DeputyDog cybercriminals from US Veterans of Foreign Wars site. Researchers at FireEye identified a cyberattack campaign dubbed SnowMan utilizing a zero-day vulnerability affecting Internet Explorer (IE) 9 and IE 10 being served from the U.S. Veterans of Foreign Wars Web site. The researchers believe the same group behind the DeputyDog and Ephemeral Hydra campaigns is also responsible for SnowMan and may be targeting military personnel. Source:... read more.

  • February 18, 2014

By Ken Phelan, Posted in Uncategorized

I’m fresh back from VMware’s Partner Exchange in San Francisco where they continued to flesh out their plan for the Software Defined Data Center (SDDC). And yes, they’re doing the same thing they do every night. They’re taking over the world. The vision is a good one. Now that we’ve virtualized compute, why can’t we virtualize everything else? And if everything’s virtualized, can’t we code against that abstraction layer and automate everything? How cool would that be? It is cool. As we know though,... read more.

  • February 17, 2014

By Nancy Rand, Posted in Uncategorized

February 13, Softpedia – (International) Oracle confirms existence of 30 security holes in Java Cloud Service. Oracle confirmed the existence of 30 security vulnerabilities in its Java Cloud Service reported to the company by Security Explorations researchers. The researchers stated that over half can be exploited to bypass the Java security sandbox. Source: February 13, – (Internatio... read more.

  • February 14, 2014

By Nancy Rand, Posted in Uncategorized

February 11, Softpedia – (International) Malicious versions of Flappy Bird game send SMSs to premium rate numbers. Trend Micro researchers spotted several rogue versions of the recently-discontinued Flappy Bird game for Android that are designed to send SMS messages to premium rate numbers. Source: February 10, Threatpost – (International) New ‘Mask’ APT campaign called most sophisticated... read more.

  • February 13, 2014

By Nancy Rand, Posted in Uncategorized

January 6, Softpedia – (International) Yahoo hacked, 2.5 million European users possibly infected with malware. Researchers at Fox-IT discovered an attack that compromised Yahoo’s ad service in order to redirect European visitors to Yahoo to domains hosting the Magnitude exploit kit, affecting as many as 2.5 million users. The attack lasted around 4 days and used Java vulnerabilities to push various pieces of malware. Source: read more.

  • January 07, 2014

By Nancy Rand, Posted in Uncategorized

January 3, Help Net Security – (International) Critical backdoor in Linksys and Netgear routers found. A security researcher identified a backdoor in certain Netgear and Linksys routers’ firmware that can be used to reset the devices to default settings, including default administrator passwords. Other brands of routers manufactured by the same company may also be affected. Source: January 3, The Register – (International) Slovenian jailed for creating co... read more.

  • January 06, 2014

By Nancy Rand, Posted in Uncategorized

December 13, Help Net Security – (International) Cryptolocker copycat targets US, European users. Researchers at IntelCrawler analyzed a new piece of ransomware dubbed Locker that encrypts targets’ files and demands a ransom to decrypt them. The ransomware is spread by executable files disguised as mp3 files. Source: December 13, Softpedia – (International) Serious vulnerability in Safari exposes user passwords. Researchers at Kaspersky discovered a se... read more.

  • December 16, 2013