Wednesday, 2 December 2015

FBI info security chief discusses taking risks with cloud, big data

Anyone is a potential target for cyber crime, reminded Arlette Hart, chief security information officer for the Federal Bureau of Investigation.
If any organization nationwide - or even worldwide - is a primary target for cyber crime, it's the FBI.
Speaking at the Structure cloud industry summit on Wednesday morning, Hart opined there are different levels of enterprise and risk, advising IT professionals in the audience to be more transparent in what they are providing from a security perspective.

Read More...


Fake terror alert emails spread malware

Researchers have uncovered malicious emails that are spoofing terror alerts from law enforcement agencies in order to trick users into downloading the Jsocket remote access trojan. 
Lionel Payet, Threat Intelligence Officer at cyber security firm Symantec, recently published a blog post in which he explains how malicious emails spoofing the email addresses of United Arab Emirates (UAE) law enforcement agencies, particularly the Dubai Police Force, are deceiving users into executing malicious email attachments.

Read More...

NSA Email Collection Continued Mapping Social Connections Between Americans

In his comments Monday, Mr. Brennan called the attacks in Paris a "wake-up call", and claimed that recent "policy and legal" actions "make our ability collectively, internationally, to find these terrorists much more challenging". And it also must be pointed out that this involves only domestic surveillance programs.
But drawing a line from Snowden to the Paris tragedy is problematic, according to a few analysts, because even two years after the leaks it is hard to isolate the extent to which they caused terrorist networks to change the way they communicate.
According to the Times, the NSA collected bulk email data through two programs which the agency operated simultaneously - one within the United States and a second one overseas.

Read More...

Tips to Prevent Data Hacking

Unfortunately, data hacking is a fact of modern life. It’s not just large companies that are at risk, we are all vulnerable. Fortunately, there are simple measures that we can take to minimise the risk. In this article, we offer a few simple tips to prevent data hacking. 

Read More...

Sunday, 15 November 2015

Windows 3.1 Is Still Alive, And It Just Killed a French Airport

A computer glitch that brought the Paris airport of Orly to a standstill Saturday has been traced back to the airport's "prehistoric" operating system. In an article published Wednesday, French satirical weekly Le Canard Enchaîné (which often writes serious stories, such as this one) said the computer failure had affected a system known as DECOR, which is used by air traffic controllers to communicate weather information to pilots. Pilots rely on the system when weather conditions are poor.

Read More...

The Edward Snowden guide to practical privacy

If you want to limit how much governments and companies know about you and your private life, then use Tor, download specific apps and plug-ins, encrypt your hard drive, and use a password manager. 
Those are among the tips provided by NSA whistleblower Edward Snowden in an interview with "digital bodyguard" Micah Lee. The interview, published on The Intercept, is interesting in that it provides a practical guide for protecting your privacy from the very mass surveillance that Snowden revealed in his huge leak of US government documents. 
The guide covers everyone from the typical concerned citizen to someone who may be handling highly sensitive documents.

Read More...

Monday, 9 November 2015

Meet the Android rooting adware that cannot be removed

Researchers have identified a new strain of malicious adware that is impossible for affected Android device owners to uninstall.  Researchers at Lookout, a San Francisco-based mobile security firm, found 20,000 third-party apps outside of the Google Play Store that are disguised as popular apps like Okta, Facebook, Twitter, WhatApp, and NYTimes. The apps maintain some of the functionality of the applications that they masquerade as, but they also launch treacherous adware campaigns that root the device for persistence and install a dropper, without the user's permission.

Read More...