The ZeuS Trojan has been modified by cybercriminals in a way that means it no longer relies on command and control (CC) servers for receiving instructions, according to Symantec security researchers. ZeuS is very popular in the cybercriminal world because it’s capable of stealing a wide variety of information, documents…
DNSChanger Trojan Still Needs to be Cleaned from Fortune 500 and US Government Systems (February 3 & 6, 2012)
Half of Fortune 500 companies and nearly half of all US federal government agencies still have the DNSChanger Trojan on their networks, according to researchers……. View full post on SANS NewsBites View full post on National Cyber Security
Why Your Company Needs To Hack Itself
Computer security expert Jeremiah Grossman thinks that traditional cybersecurity doesn't have what it takes to fight off today's wired intruders; he advocates companies and governments invite hackers to find weak spots in their systems. Although the year has just started, 2012 is turning out to be an annus horribilis for…
ASU graduate oversees cyber needs for country
FORT MEADE, MD. — Lt. Gen. Ronnie D. Hawkins Jr. is just a few days into commanding the Defense Information Systems Agency at Fort Meade, Md., but the Texan and Angelo State University graduate can look back over a military history in his family that began long before he got…
Mobile Phone Security Needs Improvement (December 27, 2011)
Research scheduled to be presented at a Chaos Computer Club convention later this week indicates that mobile network security is nowhere near as robust as it should be, especially given recent events involving certain British journalists……. View full post on SANS NewsBites View full post on National Cyber Security
HTCS1: Funniest pic I have ever seen http://t.co/OdufK9YJ lol everyone needs to see it
HTCS1: Funniest pic I have ever seen http://t.co/OdufK9YJ lol everyone needs to see it View full post on Twitter / HTCS1
Sneaky malware just needs a few clicks to take control
Criminals are getting sneakier. These days, computer viruses, Trojans, rootkits and other unfriendly software (collectively known as malware) can be foisted on our systems without our even noticing. In the early days of malware, the idea was simply to show people that their systems had been compromised; a virus was…
Hacker Group specializes according to client needs
Company: Hacker Group Team size: 200 What’s new : Focus on client growth through mobile advertising Hacker Group hires individuals who are experts in a particular discipline instead of expecting its employees to be experts in strategizing across all channels. A focus on bottom-line metrics allows the company to “get to…
Five reasons your business needs unified communications
There are so many different ways to communicate with partners, customers and co-workers: by phone, email, instant messaging, fax, video conferencing and social media. Managing each system separately is not only inefficient, but can cause conflicts since they all use the same underlying technology, the Internet. Instead, establishing a single…
Nobody from the Help Desk needs your password
View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security