The Chinese government is using censorship as a tool against U.S. companies trying to do business there, critics say The Chinese government is using Internet censorship as a trade weapon against U.S. tech companies trying to do business there, leaders of two business organizations have told a U.S. government commission…
Malware on Android begins to spiral out of control
Malware aimed at the Android platform has increased five-fold since July, raising questions on the open-door policy Android has in installing apps. IT company Juniper Networks says the reason for this is the Mountain View, Calif. company’s own lax attitude when it comes to oversight. “With no upfront review process,…
Iran says Duqu malware under ‘control’
Iran said on Sunday it had found a way to “control” the computer malware Duqu, which is similar to Stuxnet virus which in 2010 attacked its nuclear programme and infected more than 30,000 computers. View full post on computer worm – Yahoo! News Search Results View full post on National…
Mind Control: Hackers working on project that will let you control Siri with your brain (Digital Trends)
When Apple unveiled to the world the clever personal secretary we have come to know as Siri, many were excited at the possibilities this new application could bring. Apple itself touted Siri as an ingenious breakthrough and achievement — something that, once again, set Apple apart from its competitors. Of…
Sneaky malware just needs a few clicks to take control
Criminals are getting sneakier. These days, computer viruses, Trojans, rootkits and other unfriendly software (collectively known as malware) can be foisted on our systems without our even noticing. In the early days of malware, the idea was simply to show people that their systems had been compromised; a virus was…
Critical Control 5
http://www.sans.org/critical-security-controls/control.php?id=5 The next control on the list is boundary defence. It has been recognised by many organisations that protecting the perimeter, whilst important, is no longer what it is all about. Many organisations have what what we generally consider a hard crunchy outside and a soft squishy centre. The “internal”…
Android malware under blog control says Trend Micro
Trend Micro is reporting a Chinese Android malware that operates partly under the command and control of a blog. The ANDROIDOS_ANSERVERBOT.A malware is disguised as an e-book reader offered on a third-party Chinese app store. It uses two command and control servers, one of them served out of a blog…
Critical Control 2
From a support point of view, when someone calls the Helpdesk with a “there’s something going on with my pc” question, very early in the process you’ll want to know what is installed on that computer, and then what versions of each installed application. It’s also handy to know *when*…
Devices That Can Listen In on Cellphone Traffic, Control Your Phone
Law enforcement and military officials are increasingly using devices to locate people via their cellphones, even when the phones aren’t in use. But finding people isn’t all that this type of gear can do View full post on cellphone security – Yahoo! News Search Results View full post on National…
Cyber Security Awarness Month Day 3 – Critical Control 2
From a support point of view, when someone calls the Helpdesk with a “there’s something going on with my pc” question, very early in the process you’ll want to know what is installed on that computer, and then what versions of each installed application. It’s also handy to know *when*…