blog trackingRealtime Web Statistics Hits Archives - Page 5 Of 8 - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 5

Posts Tagged ‘hits’

Hacker Group Anonymous Hits Security Firm

The hacker’s group “Anonymous” has admitted that it raided the computers of U.S.-based security think tank Stratfor and stole thousands of credit-card numbers and other personal information from its clients, AP reports.

View full post on anonymous hacker — Yahoo! News Search Results

View full post on National Cyber Security

Tax Holiday Hits Social Security

Full content sent to and hosted by Yahoo!General NewsHealth & MedicineIndustry SnapshotNew Issue AmericaReal EstateTop 10Feature StoryInvestor’s Corner

View full post on could security — Yahoo! News Search Results

View full post on National Cyber Security

Tax Holiday Hits Social Security

Full content sent to and hosted by Yahoo!General NewsHealth & MedicineIndustry SnapshotNew Issue AmericaReal EstateTop 10Feature StoryInvestor’s Corner

View full post on could security — Yahoo! News Search Results

View full post on National Cyber Security

Card Reader Scam Hits South Bay Charity For Troops

The South Bay Blue Star Moms, a group that sends care packages to soldiers, was one of the credit card users hit by the recent Lucky card skimming scam.

View full post on credit card scam — Yahoo! News Search Results

View full post on National Cyber Security

Russian voters in the dark as cyber attack hits blog

Russia’s most popular blogging website, Livejournal, was down for the third consecutive day, with some alleging the cyber attack had been timed to prevent people from discussing yesterday’s vote.

View full post on cyber attack — Yahoo! News Search Results

View full post on National Cyber Security

Fraud Scheme Hits Grocer

Fraud Scheme Hits Grocer, Blog, hits, Fraud, scheme, GrocerCard Reader Compromised at Self-Service Checkout
Retailers and fast-food chains throughout the world are reporting an uptick in point-of-sale skimming incidents. Why do fraudsters find retailers and restaurants so easy to target?Fraud Scheme Hits Grocer, Blog, hits, Fraud, scheme, Grocer

View full post on CUInfoSecurity.com RSS Syndication

View full post on National Cyber Security

Gergory Evans

Foreign cyber attack hits US infrastructure: expert

A cyber strike launched from outside the United States hit a public water system in the Midwestern state of Illinois, an infrastructure control systems expert said on Friday.

View full post on cyber terrorism — Yahoo! News Search Results

View full post on National Cyber Security

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Android Malware Hits Record Heights, Report Warns

Android malware has increased 472 percent since July, a new report from Juniper Networks warned earlier this week, with the months of October and November shaping up to see the fastest jump in Android malware ever discovered, the company stated.

The number of Android malware samples identified in September increased by 28 percent over the number of known samples, according to research by the Juniper Global Threat Center.

October, however, showed a 110 percent increase in malware sample collection over the previous month and a full 171 percent increase over what had been collected up to July 2011, Juniper stated.

Previously, Juniper reported a 400 percent increase in Android malware between 2009 and the summer of 2010.



‘The Vulnerabilities Remain’

At the same time, the malware used today is becoming increasingly sophisticated, Juniper noted.

For instance, last Spring, Juniper began seeing Android malware that was capable of leveraging one of several platform vulnerabilities, allowing the malicious code to gain root access on a device, in the background, and then install additional packages, which would extend the functionality of the malware, the company explained.

Since the vulnerabilities remain in about 90 percent of Android devices out there, just about every piece of malware currently released targets them, Juniper said.

Spyware and SMS Trojans

Most such malicious applications target communications, location or other personally identifying information, Juniper said.

Of the known samples to date, 55 percent act as spyware, and 44 percent are SMS Trojans, which send SMS messages in the background to the attacker’s premium-rate numbers. Once those messages are sent, the money is not recoverable, Juniper pointed out.

Android’s open applications store model is to blame for the prevalence of malware directed at the platform, Juniper concluded.

‘Anything Can Be Uploaded’

Indeed, “Apple locks everything down and inspects every app submission, and there’s only one channel where you can get those apps,” Chris Hazelton, research director for mobile and wireless with the 451 Group, told TechNewsWorld.

With Android, on the other hand, “no one inspects the apps,” Hazelton noted. “Anything can be uploaded to the Android Market,” and there are many ways to get Android apps.

While Google (Nasdaq: GOOG) has been very quick to remove offending apps from its store and from users’ devices once it learns about them, “I think they should be more proactive, with some tools in place to inspect these apps,” Hazelton suggested.

In addition, “there needs to be security at the device level too,” he added. “It could be antivirus, or it could be other tools. Hopefully there will be a new way of protecting these devices.”

Google earns far more from Android than hardware makers, carriers or app developers do thanks to the advertising revenue it collects, so “it has the most to gain by making Android more secure and Android apps more trustworthy,” Hazelton pointed out.

‘Google Has to Play a Role’

Indeed, “Google has to play a role in monitoring and protecting their users,” tech analyst Jeff Kagan agreed.

Meanwhile, Kagan also expects security firms like [Symantec] and McAfee to see “an enormous opportunity to expand their coverage,” he told TechNewsWorld.

“We have been warning users of the coming threat to the mobile world,” Kagan concluded. “It looks like it is finally here.”

‘Don’t Be the Early Adopter’

So what can users do to protect themselves in the wake of all this?

“Don’t be the early app adopter,” Hazelton warned. “If there are no downloads or ratings already, don’t download the app. You really can’t trust unknown developers.”

Users should also pay attention to what permissions Android apps request, Hazelton said.

“Question why they need access to certain data,” he suggested. “You can’t line-item veto particular features of an app, but maybe that’s something Google should address.”

Either way, “the worst-case scenario is your device is hacked and used to listen in on your conversations or follow where you’re going,” Hazelton noted. “That’s pretty scary.”

Article source: http://www.technewsworld.com/rsstory/73786.html

View full post on National Cyber Security » Spyware/ Cyber Snooping

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Medicare card scam hits valley

Winnie Greenshields, volunteer coordinator of the local Senior Medicare Patrol, warns seniors that two local people have been contacted in a new scam to obtain Medicare card numbers.

View full post on credit card scam — Yahoo! News Search Results

View full post on National Cyber Security

Page 5 of 8« First...«34567»...Last »

My Twitter

Gregory D. Evans On Facebook