Is China innocent? New reports claim cyber attacks on Facebook, Twitter, and Apple came from Eastern Europe
After recent cyber attacks on high-profile companies like Facebook, Twitter and then Apple, everyone seemed to be pointing fingers at China. But now reports have surfaced claiming that the attacks on those companies originated from Eastern Europe.
An Eastern European gang, that is determined to sell company secrets like research [...]Read More »
Cyberattacks on the US have been traced, and all signs point to the Chinese military and a single building in China [Report]
According to report by the BBC, the origins of the unusually numerous and high-profile attacks on US companies has been found. It is indeed coming from somewhere in China — Shanghai to be exact. But it doesn’t stop there.
According to Mandiant, a US-based cyber security firm, believes that there’s [...]Read More »
In a statement released yestreday, Apple has disclosed that a number of their employees’ Macs have been compromised by malware through a vulnerability in the Java plug-in for browsers.
The website that was infected and considered responsible for hosing the malware has been identified as ‘iPhoneDevSDK’, an online forum for [...]Read More »
The Singapore Police Force has reported a sudden rise in the number of “cyber blackmail” cases being reported. The cases are also similar in that the primary target are men, and that they are tricked through social media networks.
There have been 50 cases in the last year alone that [...]Read More »
As with most companies nowadays, Burger King has an official Twitter account. (Yes, even dotTech has a Twitter account even though I don’t consider us a company per se.) It is not entirely clear who did it or how they did it, but today Burger King’s Twitter was hacked… and [...]Read More »
Most of us dislike having toolbars in our browsers because they are annoying; not only do they tend to hijack our homepages, but they use up a lot of screen real estate, making it more difficult to surf the web… especially if you have 12 toolbars installed in one browser. [...]Read More »
The same time the Wall Street Journal, New York Times and Twitter were attacked, there was a fourth company that also fell victim to a “sophisticated attack.”
Facebook, which is home to more than a billion users worldwide, was hit by a zero-day exploit that installed malware on [...]Read More »
A security flaw on iOS has surfaced that allows anyone to bypass an iPhone user’s passcode and gain access to all their contacts and photos. The bug is claimed to be present in previous versions of iOS as well, but is now getting attention once again after Apple’s most recent [...]Read More »
I just wanted to give everyone a head-up that some scumbag is using dotTech’s email to spend spam emails.
If you receive an e-mail from “firstname.lastname@example.org” that is not characteristic of the emails we send (i.e. not an article or comment notification), then the email is probably spam. [...]Read More »
Adobe Reader, Adobe’s popular PDF viewer, has a flaw that is allowing hackers to install malware on users’ computers. The exploit affects the latest version of the program (11.0.1), as well as earlier versions. This appears to be Windows only.
Adobe engineers have tried to make malware attacks harder to [...]Read More »
32% of computers around the world are infected with viruses and malware, according to Panda Security
Most anti-virus companies like to release yearly reports based on their findings throughout the year. Panda Security is no exception and has released its ’2012 Annual Security Report’. In this report you will find some stats that may or may not shock you.
Of all the computers scanned by Panda [...]Read More »
Be sure to run Windows Update this Tuesday, Microsoft is going to release a monster update that fixes 57 vulnerabilities — including a critical Internet Explorer bug
Every second Tuesday of every month Microsoft releases patches of its products on Windows. This day has come to be known as ‘Patch Tuesday’. And this upcoming Patch Tuesday is going to be one you don’t want to miss.
In total, this Tuesday (February 12) will see twelve patches being [...]Read More »
Attacks on Java may be subsided for a few days but the other kink in your armor — Flash — is now under attack. Adobe has released a security bulletin notifying Windows and Mac OS X users to update to Flash 11.5.502.149 because of an ongoing attack targeting Windows and [...]Read More »
Hackers have managed to access one of the US Federal Reserve’s websites and steal a “limited amount of data,” according to a statement. The notice that was sent via the Fed’s Emergency Communication System, however, warned that email addresses, phone numbers and other contact information had been stolen and published.[...]Read More »
“You don’t need [a zero-day exploit] to attack most Android devices if consumers are running 13-month old software,” says Chris Soghoian. Soghoian is principal technologist and senior policy analyst with the American Civil Liberties Union. He believes that the reason why there are millions of Android phones in the hands [...]Read More »
In the wake of (alleged) cyberwarfare by China, US president now has the power to order (preemptive) cyber attacks
According to a report by The New York Times, a secret White House legal review has granted the president of the United States the legal authority to order preemptive cyber attacks against a target (which can be a country), when there is credible evidence of a pending attack.
Officials [...]Read More »
A hacker has been toying with the police and the general public in Japan since last summer. The hacker has remote controlled innocent people’s computers to send killing spree threats and a bomb threat to Nintendo headquarters. This was followed by cryptic messages involving anime characters and even a microSD [...]Read More »
An upcoming book co-authored by Google’s Eric Schmidt and Jared Cohen was previewed by The Wall Street Journal, and it looks like China’s reputation as of late isn’t going anywhere anytime soon.
The book is called The New Digital Age, and it says that China is the ”the [...]Read More »
No one’s really safe from hackers these days, with Twitter joining the New York Times as one of the recent victims of security breaches recently. Twitter announced in a blog post that it detected unusual access patterns during the week, which led them to discovering attempts to access user data. [...]Read More »
Some may call it obvious but just having antivirus software installed isn’t going to help you much if hit by zero-day attacks. The New York Times had antivirus from Symantec (Norton) installed on the devices connected to their network, but that didn’t stop Chinese hackers from retrieving usernames and passwords [...]Read More »
What do you do when a student discovers then reports a serious vulnerability in your school’s network — so serious that it could potentially give access to students’ social security numbers, home addresses, phone numbers, class schedules and every other bit of information that a school would have on its [...]Read More »
Latest version of Java (7u11) is still vulnerable, Oracle issued an incomplete patch according to experts
Something surprising happened last week. Oracle issued an update (Java 7u11, Java 6u37, Java 5u38, and Java 4u40) in just three days to patch a recently discovered and massively exploited Java vulnerability. And over the weekend, too. As it turns out, Oracle didn’t do a very good job. (Is anyone [...]Read More »
The traditional password is now considered by many to be a security flaw. A combination of characters that can be cracked or even guessed is probably not the best way to safeguard our online lives today, and services like LastPass or 1Password provide an alternative through their software-generated passwords. But [...]Read More »
There are two groups in this world that are notoriously quick to react to technological change — the porn industry and hackers. The porn industry is known for pioneering new technology to try to increase revenue. For example, porn websites were one of the first websites that started accepting payments [...]Read More »
AV-TEST Institute is an organization that runs anti-virus/anti-malware tests. During AV-TEST Institute’s latest Nov/Dec 2012 anti-malware testing, 3 out 25 anti-virus software failed to gain certification. One of those 3 is Microsoft’s popular Security Essentials. (The other two are AhnLab V3 Internet Security and PC Tools Internet Security 2012.)
According [...]Read More »
‘Red October’ is global espionage malware that targeted governments around the world (USA, Iran, Russia, etc.) for 5 years… without being detected
Researchers from antivirus firm Kaspersky Lab have discovered something that sounds like it came straight out of a spy movie. A massive, on-going espionage network targeting hundreds of governmental, diplomatic and scientific organizations in at least 39 countries. Before you start pointing fingers at who might be responsible this time [...]Read More »
You know that latest Java exploit that had the world up in arms, with Firefox and Apple blocking Java and U.S. Department of Homeland Security recommending people disable Java? Yeah, well, Oracle has issued updates to Java to address and plug the exploit.
According to update notes released by Oracle [...]Read More »
A critical vulnerability in the Ruby on Rails framework has been discovered to bring devastating effects to those affected. One of the developers that confirmed its existence, Ben Murphy, says that it “gives hackers a simple and reliable way to pilfer database contents, run system commands, and cause websites to [...]Read More »
New Java zero-day exploit hits the internet, is “massively exploited in the wild” — disable Java now!
So you thought Java season was over, eh? Wrong! It is still open season on Java and a brand new, previously unknown bug has been discovered in Java that allows scumbags to install malware on the computers of netizens.
It isn’t entirely clear how this exploit is conducted but it [...]Read More »
Like seemingly every other new OS that’s left in the wild for awhile, Microsoft’s Windows RT has been jailbroken. But hold on before you start rejoicing about the prospects of running all your favorite desktop applications on a Surface, it isn’t quite there yet — at least for now.
Security [...]Read More »
It looks like Yahoo! has learned its lesson when it comes to security. After its mail service was recently hacked by an XSS exploit, the company has not only patched the problem but is also quietly rolling out an HTTPS option for its users.
HTTPS or Hypertext Transfer Protocol Secure [...]Read More »
It looks like the bad news for Microsoft’s Internet Explorer just keeps piling on, with every other day seemingly bringing news about a new security problem for the browser.
This time, however, users of the most recent versions — namely Internet Explorer 9 and 10, can rest easy. A new [...]Read More »
If there’s one thing that Microsoft doesn’t need, it’s more bad publicity for Internet Explorer. The company’s browser has often been criticized to be slow and simply downright inferior compared to other offerings right now. Unfortunately for them, it looks like more bad news is on the way.
The bad [...]Read More »
A serious security flaw has been found in one of Samsung’s Exynos chipsets, news that no Galaxy device user wants to hear. The flaw affects the Samsung Exynos 4, which means that Galaxy S III, Galaxy Note, Galaxy Note 2 and Galaxy 10.1 tablet users can all be potentially affected [...]Read More »
Since Windows XP, Windows comes with ‘AutoPlay’ and ‘AutoRun’ features. AutoPlay will show you a popup dialog whenever you insert external media (drive, CD, DVD, etc.) to choose what to do with your inserted media. AutoRun, on the other hand, allows a file on your removable media to automatically run [...]Read More »