07 Jan 2013

Crimeware Author Funds Exploit Buying Spree

“The author of Blackhole, an exploit kit that booby-traps hacked Web sites to serve malware, has done so well for himself renting his creation to miscreants that the software has emerged as perhaps the most notorious and ubiquitous crimeware product in the Underweb. Recently, however, the author has begun buying

Read More
05 Jan 2013

Deconstructing the Al-Qassam Cyber Fighters Assault on US Banks

“The intelligence community watched closely when US embassies were besieged during the week of September 11, 2012 by protests against an anti-Islam film. Soon after the physical protests, an online campaign dubbed Operation Ababil emerged in solidarity by attacking US bank websites. The self-proclaimed Izz ad-Din al-Qassam Cyber Fighters hit targets with DDoS attacks

Read More
04 Jan 2013

Secret US cybersecurity program to protect power grid confirmed

“The National Security Agency is spearheading a program, dubbed Perfect Citizen, to develop technology to protect the power grid from cyberattack. The project worries privacy rights groups.” Source:Secret US cybersecurity program to protect power grid confirmed – Yahoo! News

Read More
04 Jan 2013

Half of business networks breached by personal devices in 2012

“Over half of the UK’s business IT networks (51 percent) were breached during 2012 due to employees using their personal devices at work, according to research carried out by Virgin Media Business. Some 500 British CIOs were questioned on the pitfalls of the consumerisation of IT and bring your own

Read More
03 Jan 2013

A Tiny City Built to be Destroyed by Cyber Terrorists, So Real Cities Know What’s Coming

“The U.S. military is ramping up preparation for cyber wars of the future that will be waged over computers instead of traditional combat zones. In this world, some of our best technological advances look more like vulnerabilities. We’ve figured out how to network bank accounts, streetlights and power grids, how

Read More
03 Jan 2013

Turkish Registrar Enabled Phishers to Spoof Google

“Google and Microsoft today began warning users about active phishing attacks against Google’s online properties. The two companies said the attacks resulted from a fraudulent digital certificate that was mistakenly issued by a domain registrar run by a Turkish domain registrar.” Source: Turkish Registrar Enabled Phishers to Spoof Google —

Read More
03 Jan 2013

ICS-CERT: Cyber Attacks Against U.S. Energy Companies Happening at ‘Alarming Rate’

“Internet-based attacks on critical U.S. energy infrastructure are occurring at a greater rate than previously understood, according to a new government report. The report, issued by a cyber security team that operates within the Department of Homeland Security, found that thousands of control systems used in critical infrastructure are linked

Read More
03 Jan 2013

Japan ministry information reportedly stolen in cyberattack

“Highly confidential documents related to sensitive trade negotiations are suspected to have been stolen from computers at Japan’s farm ministry. According to The Daily Yomiuri on Thursday, citing government sources, a cyberattack originating from abroad obtained more than 3,000 pieces of information from the country’s Ministry of Agriculture, Forestry and

Read More
03 Jan 2013

Write Gambling Software, Go to Prison

“In a criminal case sure to make programmers nervous, a software maker who licenses a program used by online casinos and bookmakers overseas is being charged with promoting gambling in New York because authorities say his software was used by others for illegal betting in that state. New York authorities

Read More
02 Jan 2013

Microsoft pushes out emergency fix for Internet Explorer vulnerability

“Microsoft has released a quick fix for a vulnerability in older versions of its Internet Explorer browser that is actively being used by attackers to take over computers. The vulnerability affects IE versions 6, 7 and 8. The latest versions of the browser, 9 and 10, are not affected. The

Read More