Browsing articles tagged with " network security"
Jan
15
2013

Red October, latest superspy virus

Kaspersky has uncovered a new, far-ranging cyberspying campaign that targets government secrets. The firm has tantalizing named the malicious software behind the attack “Red October,” a nod to the famous Tom Clancy novel. Red October has been attempting to steal critical, secret documents since at least 2007, Kaspersky said in a report posted to its website Monday.  It’s designed to defeat a common encryption scheme that’s used by NATO and government agencies, Kaspersky says. It’s also capable […]

Jan
4
2013

Cisco Phone Hack

As displayed at the Chaos Communication Conference on December 29th, the most popular Cisco IP phone is vulnerable to an easy hack that allows full control of the phone. This means not only listening to conversations on the phone, but using its mic to listen to what is going on in the room. The hack, demonstrated for NBC News, allows the researchers to turn on a telephone’s microphone and listen in on conversations from anywhere around […]

Dec
18
2012

Kaspersky freezing computers

So much for Kaspersky being the best computer security out there. I currently use it on all client computers and servers, and it has been great. It uses the least amount of system resources in regards to reliable AV and security out there, but now they have kind of gone down the drain. For the past few years people have had some random freezes, but it was always limited. As of today, I know of […]

Dec
17
2012

Westoboro Baptist Church Hacked By Anonymous

As stated before, Anonymous is a hacktivist group that carries out various attacks through DDoS, hacking, website defacement, and various other methods to try and speak out against internet censorship, surveillance, oppressive governments, and other groups/people. A group attached to the online hacktivist group Anonymous claims to have hacked the Web site of the Westboro Baptist Church in response to plans by the controversial church to picket the funerals of those massacred Friday at a […]

Dec
16
2012

Threat of mass cyberattacks on U.S. banks is real

The wave of distributed denial of service (DDoS) attacks that hit U.S. banks in October was next-to-nothing compared to what could happen if cybercriminals actually carry through with their plans for next year. Imagine Office Space but on an international level. A few dollars from a few people in each country all around the world a few times a day, and it adds up real quick. According to a report (PDF) released today by McAfee Labs, an impending […]

Dec
13
2012

Banks’ websites attacked… again

Yet again major international banks were attacked with a basic DDoS. This Distributed Denial of Service attack simply slowed down/blacked out their websites, not personally identifiable information was actually accessed. This is not a new thing, less than two months ago this happened to some of the same banks, primarily Bank of America who has become an easy target for some. A group of hackers calling themselves “al-Qassam Cyber Fighters” again taking responsibility for the […]

Dec
10
2012

Hacking to protect your network?

Not sure this is the greatest idea, apparently big business thinks cybersecurity now means hacking back. So much for the push for “white hat” cybersecurity. A lot of big business now thinks attacking those they think might attack them is the best solution. You know, listening to what the other side says before attacking (if they are protesting), building an intelligent defense network, hiring hackers and paying them decent instead of attacking them, why would they […]

Nov
14
2012

DARPA National Cyber Range Rapidly Emulates Complex Networks

Realistically and quickly replicating globally interconnected networks to securely test new cyber tools and capabilities is no longer an issue for cyber researchers thanks to the DARPA-developed National Cyber Range (NCR). The NCR, which transitioned in October to the Test Resource Management Center under the Deputy Assistant Secretary of Defense for Developmental Test and Evaluation, provides a secure, self-contained facility where complex defense and commercial networks can be rapidly emulated for cost-effective and timely validation of cyber […]

Pages:«12


Hub Page


Check us out on Thumbtack!