USB sticks remain a big security weakness for many UK organisations with many employees using drives for data transport without permission and not bothering to report their loss, a Ponemon Institute study has found. The study polled 451 IT staff in the UK from a global total of 2,942 on…
Could iTunes Be Used To Spy On You?
Democracy and free speech activists worldwide have something new to worry about–cyberwarfare via iTunes. A reporter for a German magazine caught a British security firm boasting about how they can use Apple’s megapopular software to infect target computers with malware on behalf of foreign governments. At a booth this past…
Dozens used phone-hacker’s services, inquiry hears
London (CNN) — More than two dozen News International employees used the services of a convicted phone-hacker, the British government-backed inquiry into illegal eavesdropping and bribery by journalists heard Monday. “This fact alone suggests wide-ranging, illegal activity within the organization at the relevant time,” lawyer Robert Jay said Monday. Prime…
Energy giant EDF used Trojans to spy on Greenpeace
The head of nuclear security at French energy giant EDF has been given a prison sentence and his company fined a stinging 1.5 million euros (£1.3 million) after being found guilty of spying on environmental campaigners Greenpeace using Trojan malware. The company that runs 58 nuclear power stations in France…
Hackers used “Poison Ivy” malware to steal chemical, defense secrets
Attackers used an off-the-shelf Trojan horse to sniff out secrets from nearly 50 companies, many of them in the chemical and defense industries, Symantec researchers said today. The attack campaign – which Symantec tagged as “Nitro” – started no later than last July and continued until mid-September, targeting an unknown…
DOJ Used Secret Court Order to Obtain Data in WikiLeaks Investigation (October 10, 2011)
The US Justice Department’s (DOJ) obtained secret court orders to gain to information about the accounts of former WikiLeaks spokesman Jacob Appelbaum from Google and Internet service provider (ISP) Sonic……. View full post on SANS NewsBites View full post on National Cyber Security
Syracuse woman gets probation in credit-card scam that used Midwestern names
Shantique Settles used her job at the J.C. Penney store in Carousel Center to open fraudulent accounts used to buy $3,500 in gift cards, prosecutor says. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security
Hackers say German officials used backdoor
A screenshot from the Chaos Computer Club’s blog post on the Trojan it claims was used by German government law enforcement for suspect surveillance. (Credit: Chaos Computer Club) A German hacker group says it has found a Trojan program designed for spying on Skype communications that it alleges was used…
Zero-day exploits rarely used by criminals, Microsoft finds
Software exploits, including zero-day attacks, appear to play a much smaller part in malware infections than previously thought, Microsoft’s latest Security Intelligence Report (SIRv11) has found. The vast majority of malware infections detected by the company’s Malicious Software Removal Tool (MSRT) for the first half of 2011 depended either on…
Hackers say German officials used backdoor Trojan
A screenshot from the Chaos Computer Club’s blog post on the Trojan it claims was used by German government law enforcement for suspect surveillance. (Credit: Chaos Computer Club) A German hacker group says it has found a Trojan backdoor program designed for spying on Skype communications that it alleges was…