blog trackingRealtime Web Statistics Largest | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Largest’

Largest ever cyber wargame tests Europe’s defences


Europe’s biggest ever cyber security war diversions exercise has started, with the point of testing how nations can cooperate against a significant cross-fringe security danger. Throughout its first stage, the Cyber Europe 2014 occasion unites more than 200 associations including vitality organizations, telecoms administrators, and 400 security experts. The scale of the cyberwargame demonstrates how genuinely countries now take the danger of computerized assaults, and is only one of various such wargames being run in Europe as advanced systems are currently seen as a standard battleground in any clash. The coordinators said the topic of the occasion was not impacted …continue reading

For more information go to, http://www., or

The post Largest ever cyber wargame tests Europe’s defences appeared first on National Cyber Security.

View full post on National Cyber Security

Sentry360 announces largest 360-degree camera deployment in mass transit history

Top Priority Sector:  video_surveillance_cctv Plainfield, IL-based Sentry360, a manufacturer of advanced Ultra-HD surveillance cameras and systems, has announced the deployment of the largest 360-degree surveillance camera system in mass transit history. Read More….

View full post on The Cyber Wars

New York City Road Runners secure world’s largest marathon with Sony IP Cameras

Top Priority Sector:  video_surveillance_cctv The New York City Marathon is the largest in the world. After the 2012 race was canceled due to Superstorm Sandy, a record number of runners turned out for the return of the marathon in 2013. Read More….

View full post on The Cyber Wars

Seoul to host largest international gathering on cyberspace

  Around 1-thousand IT experts from more than 90 countries will gather in Seoul next week to discuss ways to tackle cyber crimes. Under the theme of “Global Prosperity through an Open and Secure Cyberspace,” the Seoul Conference on Cyberspace 2013 will focus on six main issues: economic growth and development, socio-cultural benefits, cyber security,
[continue reading…]

For more information go to, http://www., or

View full post on National Cyber Security

7GB data Leaked from Azerenergy, Azerbaijan’s largest electrical power producer

Once again anonymous hacktivist have announced another leak of data from the Azerbaijan government and more so its  largest electrical power producer . View full post on Cyber War News Read More….

View full post on The Cyber Wars

Flashback the largest Mac malware threat yet, experts say


Unless you’ve been living under a rock for the past week, you’ve probably heard about Flashback, a piece of malware targeting users of Apple’s
Mac OS X that’s now estimated to be quietly running on more than 600,000 machines around the world.

That number, which came from Russian antivirus company Dr. Web earlier this week, was confirmed today by security firm Kaspersky. More than 98 percent of the affected computers were running Mac OS X, the firm said.

That’s certainly a big number, but how does it stack up to past threats?

“It’s the biggest, by far,” Mikko Hypponen, chief research officer at antivirus and computer security firm F-Secure, told CNET in an e-mail. “I’m afraid the malware-free times of Mac users are behind us permanently.”

Separately, Catalin Cosoi, chief security researcher for antivirus-software maker Bitdefender, said the infection was likely the largest for the Mac so far this decade, but that there’s no precise way to measure how many Mac OS computers have been compromised.

“600,000 represents around 12 percent of the Mac OS computers sold in Q4 2011,” Cosoi said, “which means that if we count the number of Mac OS devices sold in the past three years, we can estimate that less than 1 percent of the Mac OS computers are possibly infected. On the other hand, if we look at the actual numbers and not at the percentages, the numbers look pretty scary.”

Why now?
The consensus among security researchers is that a threat this size has been long overdue for the Mac, in no small part because of the platform’s growing popularity.

Apple has outpaced the growth of the PC industry for 23 straight quarters, according to data from IDC. While the company’s iOS devices, like the
iPhone and
iPad, have not surprisingly seen much faster growth and overall sales in recent years, Apple also broke a Mac sales record in its last quarter, selling more than 5 million computers — all of which were, of course, running the company’s proprietary operating system.

That kind of growth, which as of February put Apple’s installed base of Mac OS X users at 63 million, has not gone unnoticed by attackers, according to security researchers.

“As more people buy and use Macs, we’ll see more malware,” Charlie Miller, a principal research consultant for Accuvant Labs, told CNET by telephone. “Part of it too is that it’s a Java vulnerability, and the actual exploit is OS independent, so (malware writers) didn’t have to know how to write an OS X exploit.”

In this particular instance, the weak point that malware writers were targeting was Java, a technology Apple hasn’t included out of the box on its computers since 2010, but that it supports with its own releases. The runtime is used from anything from enterprise applications to popular 3D games like Minecraft. In November 2010, when announcing plans for the OpenJDK project, Apple said it would continue to maintain these versions through Lion, but that Java SE 7 and beyond would be handled and distributed by Oracle.

Java or no, Paul Ferguson, a senior threat researcher at Trend Micro, suggested that HTML5 — a Web standard in progress that Apple, Microsoft, and other browser makers are helping to build — holds the same type of threat for future attacks.

“Wait until HTML5 becomes more ubiquitous for similar types of threat vulnerabilities, and you can have a botnet that runs in your browser,” Ferguson cautioned. “The more ubiquitous these platforms are, it won’t matter if it’s a mobile device or a computer. It it’s running Java or any other cross-platform technology, the threat is there.”

Not the first mainstream threat to the Mac
Malware programs are designed to harvest user information that can be sold to third parties, or used for fraudulent activities. Infected machines can also be used as botnets, which can be rented for use in distributed denial of service attacks. Flashback is the latest in a series of attacks against Mac users through malware — though it turns out not to be so new.

“Flashback’s come back around a few times now,” said Steve Bono, principal security analyst for Independent Security Evaluators. “It’s possible that these computers have been infected since the beginning — sometime last fall. These things go unpatched, and once a vulnerability is known, it can take months to make the patch.”

That’s exactly what happened with Flashback. While earlier versions that relied on a piece of software meant to look like Adobe’s Flash installer were squashed as part of security updates, this latest variant went through Java instead. Oracle updated Java to patch the vulnerability the attackers were going through in February, though Apple took longer to patch the version it maintains and delivers to users through its software update tool.

MacDefender, last year’s big malware scare, pretended to be an antivirus program.


Prior to Flashback, the malware of interest was a piece of software called MacDefender, which also went by the name of Mac Security and Mac Protector. The fake antivirus program preyed on users by pretending to be a legitimate antivirus program that would find things on a computer then get rid of them in return for users acquiring a full license to the software. As it turned out, the viruses it was pretending to find were actually coming from MacDefender itself.

“The fake antivirus epidemic from last year was the real turning point,” Roel Schouwenberg, a senior researcher at Kaspersky Labs, told CNET. “With all the media attention, malware authors realized they could make money off Macs.”

Schouwenberg noted that besides the initial wave from Flashback, and the Mac Defender infections, there was an attack from malware that actually changed your Mac’s DNS settings.

Apple’s response to the MacDefender issue was to first issue a way for users to identify the malware when coming across it on the Web, then to release a series of updates to its own built-in malware scanner in OS X called XProtect, all in order to protect users from accidentally installing it. Those tools were also able to remove it from machines on which it had already been installed.

Patching the future
One aspect of Apple’s internal culture that frustrates security experts is that the company’s stance on fixing vulnerabilities has been inconsistent. Experts note that while Apple’s mobile iOS platform has been patched in a timely manner, and there are even some at the company who “beat the security drum” (according to Schoewenberg), Flashback is an example of the process not working.

“Flashback was patched by Adobe for all major platforms back in February, but Apple only patched it this week,” Schoewenberg said. “Waiting two months is not acceptable, and we see OS X threats evolving.”

Apple’s Gatekeeper technology coming in the next version of OS X promises to tighten down OS security.


Apple, which declined to comment on the Flashback malware, announced plans to tighten up security in the next major version of Mac OS X, due for release this summer, with a feature called Gatekeeper. The new protection tool offers to keep users safe by requiring that developers register with Apple to have their applications signed and verified by Apple. Users can then choose whether they want to keep their computers from installing software that hasn’t been signed by a registered developer.

“The approach they’re taking is two-pronged: Gatekeeper to make you download stuff that has at least some checking for malicious code, and antivirus [XProtect] baked into the OS for when you happen to get hit,” Miller said. “On the grand scheme, they have the right ideas, they just haven’t been keeping up on things like they should.”

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

2012-02-21 – SANS Institute Makes its Largest Training Event of the Year, SANS 2012, Available via Live Simulcast

SANS Institute Makes its Largest Training Event of the Year, SANS 2012, Available via Live Simulcast

View full post on SANS Press Room

View full post on National Cyber Security » Announcements

Symantec claims largest ever Android malware find

The largest-ever Android malware campaign may have duped as many as 5 million users into downloading infected apps from Google’s Android Market, according to Symantec.

Dubbed “Android.Counterclank” by Symantec, the malware was packaged in 13 different apps from three different publishers, with titles ranging from “Sexy Girls Puzzle” to “Counter Strike Ground Force”. Many of the infected apps were still available on the Android Market at time of writing.

“They don’t appear to be real publishers,” said Kevin Haley, a director with Symantec’s security response team. “These aren’t re-bundled apps, as we’ve seen so many times before.”

Haley was referring to a common tactic by Android malware makers to repackage a legitimate app with attack code, then re-release it to the marketplace in the hope that users will confuse the fake with the real deal.

Symantec estimated the impact by combining the download totals, which the Android Market shows as ranges, of the 13 apps, arriving at a figure between one million on the low end and five million on the high. “Yes, this is the largest malware [outbreak] on the Android Market,” said Haley.

Android.Counterclank is a Trojan horse that when installed on an Android smartphone collects a wide range of information, including copies of the bookmarks and the handset maker. It also modifies the browser’s home page. The hackers have monetised the malware by pushing unwanted advertisements to compromised Android phones.

Although the infected apps request an uncommonly large number of privileges, something that the user must approve, Haley argued that few people bother reading them before giving their okay.

“If you were the suspicious type, you might wonder why they’re asking for permission to modify the browser or transmit GPS coordinates,” said Haley. “But most people don’t bother.”

Android.Counterclank is a minor variation on an older Android Trojan horse called Android.Tonclank that was discovered in June 2011.

Some of the 13 apps that Symantec identified as infected have been on the Android Market for at least a month, according to the revision dates posted on the e-store. Symantec, however, discovered them only yesterday.

Users had noticed something fishy before then.

“The game is decent… but every time you run this game, a search icon gets added randomly to one of your screens,” said one user after downloading “Deal Be Millionaire” application. “I keep deleting the icon, but it always reappears. If you tap the icon you get a page that looks suspiciously like the Google search page.”

Android users have hammered one of the infected apps with low review scores, calling it ‘crap’. All 13 suspected apps are free for the downloading.

Symantec’s researchers have told Google of their discovery, said Haley. Google, however, did not immediately reply to questions and a request for confirmation on the security firm’s claims.

Haley said Symantec’s researchers are still “peeling back the layers of the onion,” and added that the company would publish more information on the threat as it unearthed details. “What’s interesting here is that instead of taking legitimate apps, [malware authors] have created apps similar to legitimate ones,” said Haley. “That, and the big numbers of downloads, of course.”

Symantec has published a list of the 13 infected apps on its website.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

ProtectMyID: In honor of Data Privacy Day, we review the largest data breaches of 2011. #dataprivacy

ProtectMyID: In honor of Data Privacy Day, we review the largest data breaches of 2011. #dataprivacy

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

NYPD ushers in largest class since ’05


States News Service

NEW YORK — Mayor Michael R. Bloomberg and Police Commissioner Raymond W. Kelly today presided over a graduation ceremony for 1,519 new police officers at Madison Square Garden. The graduates recently completed over six months of intensive training at the Police Academy and will be assigned to Operation Impact, the program that pairs rookie officers with experienced supervisors and deploys them to targeted high-crime areas.

It’s been another unforgettable year for the NYPD: two terrorist plots foiled, a smooth handling of the 10th anniversary of 9/11 amid significant security threats, and a massive mobilization to help evacuate citizens during Hurricane Irene, said Mayor Bloomberg. Despite all those challenges, the department still succeeded in keeping New York City the safest big city in the country. Today’s graduates will build on that success. Earlier this month, we were tragically reminded of the bravery required to join the NYPD and the kind of heroes that make up the department. Good luck, and congratulations again to you and your families. May God bless and protect each of you and may God continue to bless the NYPD.

Members of this class were born in 58 countries, and speak 65 different foreign languages, said Commissioner Kelly. In their enthusiasm for this city and this country, these new officers have chosen to contribute to civic life. They are joining an outstanding team. Their fellow officers have driven crime down by 35 percent in the past ten years, and in the past twenty years, they’ve achieved what’s been deemed a Guinness Book of World Records crime reduction.

There are 136 members of the class who have prepared for their careers by serving in other positions within the New York City Police Department. Of them, 72 served in the Police Cadet Corps, 32 were School Safety Agents, 29 served as Traffic Enforcement Agents and three were Police Communication Technicians. In addition, 134 served in the military. Approximately 24 percent of the graduates are Hispanic, 13 percent are black, 8 percent are Asian and 54 percent are white. Approximately 13 percent of the graduates are female.

Mayor Bloomberg presented the Mayor’s Award to Police Officer Eric W. Levy, for earning the highest overall average in today’s class. In addition, Police Officer Robert J. Miller received the Police Commissioner’s Award for earning the second-highest overall average, and Police Officer Alexander A. Bustamante received the First Deputy Commissioner’s Award for earning the highest academic average. Police Officers Kevin J. Brabazon and Megan A. Mayrose received the Chief of Department’s Award for earning the highest physical fitness runoff average. Police Officer Adam G. Geslak received the Deputy Commissioner of Training Award for earning the highest firearms proficiency average. Police Officers Ethan T. Clyde and Michael A. Gammone received the Commanding Officer’s Award for exceptional police duty. Police Officer Earl J. Morgan received the Patrolmen’s Benevolent Association Award as outstanding company sergeant. Police Officer Donald L. Daal received the New York City Police Foundation Award for exceptional community service.

Out of the class, 64 of the candidates speak one of 65 different foreign languages and 265 of the candidates were born outside the United States, in 57 different countries:


Albania -3















Dominican Republic-38



El Salvador-3











Ivory Coast (Cote D’Ivoire)-1



Korea, South-7




Macedonia, (The Former Yugoslav Rep.)-1












Saint Lucia-2

Trinidad and Tobago-8



United Arab Emirates-1




Copyright 2011 States News Service

View full post on PoliceOne Daily News

View full post on National Cyber Security

Page 1 of 212»

My Twitter

Gregory D. Evans On Facebook