Security in the News – Week of March 3

Information Security

Chicago Tribune

Cyber Attacks Up 32% in 2013

March 5

Crashing websites, overwhelming data centers, new-gen of cyber-attacks costing millions, staining structure of internet.

 

Computerworld

How to Protect Personal Data

March 3

Privacy under attack, but there are things you can do to protect your personal data.

 

CIO Not Only One to Blame for Target Breach

March 5

Jacob’s resignation not surprising, but disappointing, analysts say.

 

CSO

Organized Fraudsters Pose Biggest Cyber Security Threat

March 3

Growing attacks reflect evolving criminality, impact grows with mobile compromises, financial fraud.

 

Help Net Security

Cyber Crooks Will Go After Medical Records Next

March 3

Cyber crooks to look for new, more lucrative targets, and ones poorly secured.

 

Managing Vulnerabilities in Business Context

Monday 3

Cyber-attacks have direct impact on bottom line, yet many orgs lack visibility to manage risk from perspective of business.

 

Trends Shaping Mobile Forensics

March 3

Interviews with leading mobile forensic experts asked opinion on top trends shaping mobile forensics.

 

Cyber Security Concerns Becoming Boardroom Issue

March 6

Cyber security planning, protection is key theme on strategic agenda of boards, CEOs.

 

Peek into China’s Burgeoning Mobile Cybercriminal Underground

March 6

Chinese underground market awash with cyber crooks buying, selling services and devices, aimed at taking advantage of them.

 

Krebs on Security

Thieves Jam Up Smucker’s Card Processor

March 4

Shuttered online store, notifying visitors site retooled because of security breach jeopardized customers’ credit card data.

 

Network World

Nearly All Apps are Vulnerable

March 3

96% of apps tested show at least one security vulnerability, an improvement.

 

Even Apple and Google Can’t Protect Users from Inherent Mobile App Risks

March 4

There is no such thing as a free app.

 

RSA Conference Recap: Positive Direction for Security Industry

March 3

Discussions focused on enterprise customer requirements rather than silver bullet solutions.

 

CyberLocker’s Success Will Fuel Copycats

March 5

Ransomware with unbreakable encryption will attract cyber bandits like flies to offal.

 

Apple Reveals Unprecedented Details in iOS Security

March 6

Updated Apple whitepaper reveals interlocking, defense-in-depth architecture for iPhone, iPad OS.

 

Half of Exploits Target Java

March 6

Java’s prevalence on devices and lax defenses make it a favorite target of malware developers.

 

PC Magazine

How to Report Internet Fraud

March 5

The rate of Internet fraud is increasing. Here’s what to do if you’re one of its victims.

 

Security Affairs

FireEye 2013 Advanced Threat Report on APTs Campaigns

March 6

FireEye 2013 Advanced Threat Report provides high-level overview of computer network attacks by APTs discovered.

 

We Live Security

Netflix Phish, Tech Support scam, Same Phrying Pan

March 3

Tech support scam, taking money for a computer problem you don’t have; this one is too interesting not to look at.

 

Twitter Mass Password Reset Was Mistake

March 4

Password reset sent to users due to supposed compromise of accounts; company admitted reset was initiated by mistake.

 

More than 300K Wireless Routers Hijacked

March 4

Unknown cybercriminals made malicious changes to devices’ settings, misdirect computers to websites of choice.

 

Courier Scams – Don’t Give Away Bank Card

March 5

Elaborate scam reported a few times in the UK in the past few months.

 

Security and Crisis Management

Reuters

Two Dead in Venezuela Violence as Protests Drag On

March 7

Venezuelan soldier, motorcy

clist died in confused melee sparked by opposition’s barricading of street, boosting death toll from nearly a month of violence to 20.

 

Thais Defer Decision on Emergency after Two Hurt in Shooting

March 7

Thai officials assessing whether to maintain state of emergency hours after two wounded in shooting at site of anti-government protests.

Bookmark the permalink.

Leave a Reply