Security researchers have discovered it's possible to track a cellphone's location by listening to unencrypted broadcast messages from cell phone towers. read more View full post on cellphone security – Yahoo! News Search Results View full post on National Cyber Security
Attackers have all they need from leaky cellphone networks to track you down
GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research. View full post on cellphone security – Yahoo! News Search Results View full post on National Cyber Security
IPv6 networks targetted by DDoS attackers
Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a report published recently by DDoS mitigation vendor Arbor Networks. Even though 2011 was the first year when IPv6 DDoS attacks were recorded, such incidents remain rare because they…
Hackers roamed Nortel’s networks for over 10 years
Hackers roamed Nortel’s networks for over 10 years By Kathleen Hickey Feb 15, 2012 Hackers gained access to Nortel’s networks and took documents for more than a decade, even for years after the breach was discovered, according to a report in the Wall Street Journal. Former Nortel employee Brian Shields, who…
Hackers roamed Nortel’s networks for over 10 years
Hackers roamed Nortel’s networks for over 10 years By Kathleen Hickey Feb 15, 2012 Hackers gained access to Nortel’s networks and took documents for more than a decade, even for years after the breach was discovered, according to a report in the Wall Street Journal. Former Nortel employee Brian Shields, who…
How Malware Networks work and how to defend against them
<!– Sign up for our Newsletters | –> Sign up for our Newsletters | Email the Editor | Print In 2011, cybercriminals stepped up their game with the creation of malware networks (malnets)-distributed network infrastructures that exploit popular places on the Internet like search engines and social networking sites…
Senate Bill May Require ‘critical’ Networks to Adopt Cyber Standards
A bill in the U.S. Senate would require operators of so-called critical infrastructure networks to adopt cybersecurity practices if evaluations by the U.S… View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security
Beware malware networks in search engines
WebPulse Collaborative Defense/Blue Coat The network of components that comprise the prominent “malnet” known as Shnakule. A new security report warns of malware networks (“malnets”) lurking within Google and other search engines, driving unsuspecting Web surfers to sites where they might share their personal or financial information to unintended parties….
12.6.12 Real Networks RealPlayer Multiple Remote Code Execution Vulnerabilities
CVEs: CVE: CVE-2012-0922,CVE-2012-0923,CVE-2012-0924,CVE-2012-0925,CVE-2012-0926,CVE-2012-0927,CVE-2012-0928 Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security
DDoS attacks motivated by politics not criminality, Arbor Networks finds
Large Internet organisations believe ideological and political motivations have become the single commonest motivation behind the DDoS attacks hitting their networks, a survey of major Internet firms by has found. As expected, Arbor Networks’ annual Infrastructure Security Report survey of 114 tier 1 Internet infrastructure firms, hosting companies and large…