Network Security

Network Security news, information, and how-to advice

white house

shellshock
In Depth

Report: Criminals use Shellshock against mail servers to build botnet

Targeting message transfer agents (MTAs), mail delivery agents (MDAs), and spam filters, criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to a variety of server software that...

Tor Project flags Russian 'exit node' server for delivering malware

The server used a technique to append malware to legitimate code

usb drive

USB is now UEC (use with extreme caution)

USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown.

staples store

Staples confirms data breach investigation

Monday evening, investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the...

obama credit

Obama signs Executive Order to bolster federal credit card security

On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged...

poodle at play

Dreaded SSLv3 bug no monster, only a POODLE

On Tuesday, Google's Bodo Möller, along with fellow researchers Thai Duong and Krzysztof Kotowicz, disclosed the existence of a vulnerability in SSLv3, which allows the plaintext of secure connections to be calculated by an attacker...

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

Hong Kong democracy activist websites compromised

The attacks are suspected to be aimed at compromising activists

kmart storefront

Kmart discloses malware related data breach

On the same day that Dairy Queen announced their own malware-based data breach, Kmart (owned by Sears Holdings Corp.) reported the discovery that credit and debit cards were compromised after criminals installed malware on their...

symantec logo

Analysts react to Symantec split announcement

On Thursday, Symantec said that it would separate into two business units; one that focuses entirely on security, while the other sticks to information management. Symantec's announcement follows similar ones from Hewlett-Packard and...

dairy queen grill chill sign

Dairy Queen confirms Backoff malware led to data breach

On Thursday, the Minneapolis-based Dairy Queen confirmed a data breach that impacts 395 stores. The fast food chain says that the source of the breach itself is the same family of POS malware that gained attention earlier this summer...

Russian faces more charges in point-of-sale hacking case

Roman Valeryevich Seleznev has been charged with 11 counts of wire fraud

Phishing for passwords.

What to do in the aftermath of the JPMorgan breach

The compromise of 10s of millions of JPMorgan Chase accounts poses the greatest risk of phishing attacks on consumers and small businesses, experts say.

jpmorgan

JPMorgan says breach impacted 76M households and 7M small businesses

On Thursday, JPMorgan Chase (JPMC) updated investors about their recently disclosed data breach in an 8-K filing with the Securities and Exchange Commission. The incident impacts 76M households and 7M small businesses.

shellshocked3

Shellshock attackers targeting NAS devices

Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.

Threat Intelligence firm mistakes research for nation-state attack

A Bloomberg story, backed by data collected by threat intelligence firm, ThreatStream, mistakenly identified scans by a security researcher as a nation-state attack. According to the data, Chattanooga, TN is second only to Beijing in...

5 horror movies that scare security pros

Image by DreamworksHere are five iconic movies whose plot lines might be adapted to strike fear into the heart of today's tech professionals. The horror movie genre has given us some great classics through the years, but for IT...

Hong Kong protest

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

Load More