British lawmakers to quiz Snowden leaks newspaper editor

British lawmakers will question the editor of the Guardian newspaper next month over publishing intelligence files from U.S. spy agency contractor Edward Snowden after warnings from security chiefs that the leaks damaged UK national security.Alan Rusbridger will appear before the House of Commons home affairs select committee, the ...

Power Plants and Other Vital Systems Are Totally Exposed on the Internet

Researcher Paul McMillan thinks the pharmacy may have been monitoring the computer activity of employees using the remote access program TeamViewer, but then failed to secure the application, allowing anyone else on the internet to view the employee computer screen as well. Contacted by WIRED, the customer said ...

Developers need to start thinking about security now

It’s broken because security teams drive security, and development teams let them. There needs to be a re-balancing of this relationship, driven by an awakening in the developer community.Development teams abdicate security because they don’t understand it. They abdicate because they are too busy building features. They abdicate ...

America Spies On Nigerian State Security Services, SSS Daily Via Computer Hacking & Telephonic Interceptions

US Spies On Nigerian State Security Services, SSS Daily Via Computer Hacking & Telephonic Interceptions There is an authoritative hint that the United States of America (USA) is spying on Nigeria’s security agencies, especially the State Security Services (SSS). This was revealed by the American newspaper, New York ...

Porn-viewing bosses infect corporate networks

A surprising number of IT professionals say they have to clean up corporate devices infected by executives who went to porn sites. According to a recent survey by software firm ThreatTrack Security, 40% of tech support employees admit they\\'ve had to clean an executive\\'s corporate device after the ...

Google Play In-App Billing Library Hacked

I successfully exploited two bugs in Google Play In-App Billing Library, which allow to impersonate the Google Play billing service and circumvent the signature verification. I was able to retrieve unlimited amounts of in-app items in games like Temple Run 2, which uses this library.This blog post was ...

Anonymity is the ENEMY of PRIVACY, says RSA grande fromage

Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.Protecting your company to survive unexpected disruptions: use the flowchart to find the unprotected gaps in your core business applications.While HPC is not new, it ...

CyberCrime & Doing Time: A Prominent American Express Phish

The spam messages started flowing shortly before 9 AM, and by 10:30 we had received 548 copies of a spam email that looked like this: But the highlighted link that claims it will take you to https://www.americanexpress.com/ actually goes to one of 419 URLs on one of 57 ...

Obscurity is a Valid Security Layer

Many of us are familiar with a concept know as Security by Obscurity. The term has negative connotations within the infosec community—usually for the wrong reason. There\\'s little debate about whether security by obscurity is bad; this is true because it means the secret being hidden is the ...

Cryptolocker Holds Your Files For Ransom

A new piece of ransomware is giving Internet users one more reason to think twice before they click a link in an email. A virus known as Cryptolocker has been infecting PCs around the world and effectively holding the files within for ransom. Users who have their files ...

Hacking from below: Subcontractors can leave big companies vulnerable

While the largest companies in the energy industry have taken steps to protect themselves from intruders, they\\'ve failed to insist on the same vigilance from their subcontractors, said Stephen Coty, director of threat research for Houston-based security firm Alert Logic. Coty said the gaps in...HOUSTON — Hackers are ...

Infection rates and end of support for Windows XP

In the newly released Volume 15 of the Microsoft Security Intelligence Report (SIRv15), one of the key findings to surface relates to new insight on the Windows XP operating system as it inches toward end of support on April 8, 2014.In this post we want to highlight our ...

How Seniors Put Themselves at Risk for ID Theft Online

NEW YORK (MainStreet) — Conventional wisdom has it that age begets wisdom — but being technologically savvy about protecting your identity and money while online is a whole different thing.According to the U.S. Federal Trade Commission, consumers age 65 and up are particularly vulnerable to online ID theft."Many ...

If you travel a lot, Distress Signal is an app well worth having on your phone

Sometimes the simplest ideas make the most useful apps. Distress Signal is aimed at people in need of the emergency services but without the ability to speak to them on the phone. Maybe you’re in a country where you don’t speak the local language, or maybe you’re in ...

Hacked small-businesses often have no place to turn

Participant hold their laptops in front of an illuminated wall at the annual Chaos Computer Club (CCC) computer hackers\\' congress, called 29C3, on December 28, 2012 in Hamburg, Germany. It was March 2010, the height of the financial crisis, and the housing market was in the dumps. Michelle ...

ATM malware coughs up cash on demand

Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.I currently purchase or influence the purchase of computer security related services and/or applications:*A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.If you do not receive your confirmation email within the ...

Obama's Likely Pick for NSA Chief Is a Master Spy. It May Not Be Enough.

Vice Admiral Michael S. Rogers, the odds-on favorite to be nominated by President Obama as the next director of the National Security Agency, has all of the intelligence and military credentials for the position. "A walking resume for this job," said retired Admiral James Stavridis, who recently served ...

Black Hole Exploit - A Business Savvy Cyber Gang Driving a Massive Wave of Fraud

Tucked away in a small town outside Moscow, Russia one of the world’s most prolific and effective cybercriminals works away on the next version of malicious software that will enable the theft of millions of dollars from unsuspecting victims around the world.Going by the online moniker of “Paunch,” ...

AVG, Avira and WhatsApp pwned by hacktivists' DNS hijack

The websites of freebie antivirus vendors AVG and Avira as well as mobile messaging service WhatsApp appear to have been hit by a DNS redirection attack today which sent users to pro-Palestinian websites.Visitors to avg.com were greeted by a rendition of the Palestinian national anthem (via an embedded ...

Ensuring the Right Security Budget for 2014

“It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity…” Charles Dickens, A Tale of Two Cities Given the state of budget ...