In Attack on Vatican Website, a Glimpse of Hackers' Tactics

In Attack on Vatican Website, a Glimpse of Hackers' Tactics
CNBC.com
The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony The attack, albeit an unsuccessful one, provides a rare glimpse into the recruiting, reconnaissance, and warfare tactics used by the ... The group’s attack on the Vatican was confirmed by the hackers and is detailed in a report that Imperva a computer security company based in Redwood City, Calif., plans to release ahead of a computer security conference here this week. It may be the first end-to-end record of a full Anonymous attack. . . .Their goal — according to YouTube messages delivered by an Anonymous figure in a Guy Fawkes mask — was to disrupt the event and draw attention to child sexual abuse by priests, among other issues. . . .

CNBC.com

Beware the Morphing Flashback Malware
TidBITS
by Adam C. Engst As TidBITS Security Editor Rich Mogull wrote in “Gatekeeper Slams the Door on Mac Malware Epidemics” (16 February 2012), the most significant security hole on the Mac stems from users being tricked into installing something malicious, ...

WikiLeaks Partners with Anonymous to Spill Millions of Security Firm's E-mails
New York Magazine
By Brett Smiley WikiLeaks is back at it, this time and for the first time with the assistance of global hacker group Anonymous. On Monday, the whistle-blowinggroup led by 40-year-old Australian Julian Assange began to release "millions" of e-mails ...

New York Magazine

New OS X malware variant attacks unpatched Macs
ZDNet (blog)
By Adrian Kingsley-Hughes | February 27, 2012, 4:13am PST Summary: A new malware variant sets out to punish those who haven't been keeping up to date with updates. Patching OS X is so simple, but yet there are people who still put it off.

Qualys Launches Enterprise Edition of Malware Detection Service
MarketWatch (press release)
Delivered as part of the QualysGuard Cloud Platform and suite of integrated applications for security and compliance, the new Enterprise Edition of the QualysGuard Malware Detection Service allows businesses to proactively scan their web properties for ...

Glimmerglass Showcases Cyber Security Solutions at RSA Conference 2012
SunHerald.com
The RSA Conference is a gathering of information security experts that meet, discuss, and share current challenges and accomplishments facing cyber security. The CyberSweep platform enables the dynamic selection of optical signal sources, ...

Android malware spreads via Facebook app
IBNLive.com
Android recently implemented a new program, called Bouncer to help keep malware off the Market, but it seems that there are some scammers who have found a way around the program, nevertheless. Security firm, Sophos have reported that there is malware ...

Netronome Enhances SSL Offering for Cyber Security Applications
MarketWatch (press release)
Netronome's flow processing solutions enable cyber security OEMs to offer high-density 1, 10 and 40 gigabit Ethernet network designs, supporting up to 100 Gbps of application performance. Over 56 billion instructions per second ensure that every ...

CrowdStrike CEO to reveal 'major mobile vulnerability' at RSA
Computerworld
By Wayne Rash CSO - A significant vulnerability affecting all versions of the Webkit mobile browser could give malware complete control of your phone. The malware could listen in on your conversations, view through your camera and record everything in ...

Harris Corporation to Discontinue Cyber Hosting Operation; Will Continue ...
MarketWatch (press release)
The company determined that although demand continues for cyber security and cloud-enabled solutions, its government and commercial customers currently prefer hosting mission-critical information on their own premises rather than remotely.

Android drive-by download attack via phishing SMS
ZDNet (blog)
By Ryan Naraine | February 27, 2012, 7:29am PST Summary: A new security start-up focused on helping businesses deal with targeted attacks plans to showcase a drive-by download that plans malware silently on Android smart phones.

Kenya signs MoU to boost cyber-security
Daily Nation
By NATION CORRESPONDENT Kenya has signed a deal with a United Nations agency to boost the country's efforts in enhancing cyber-security. In a memorandum of understanding signed in Geneva last week by the International Telecommunication Union (ITU) and ...

eMudhra to address online security issues in India and Mauritius
India Education Diary
Online security is a major concern in the present scenario. We are constantly working on addressing the security issues and I am sure, this tie-up with Watchdata will help us in significantly increasing the security levels in online banking", ...

Commtouch Launches Enhanced Antivirus for Email Solution
MarketWatch (press release)
27, 2012 /PRNewswire via COMTEX/ -- RSA Conference -- Commtouch® (UTD:CTCH) today announced the availability of its enhanced Antivirus for Email solution which uses a unique dual-detection approach to ensure malware identification from the zero-hour of ...

Hacker 'Codeine' is a headache for town council
Herts and Essex Observer
BISHOP'S Stortford Town Council has denied a computer hacker's claims that its website is vulnerable to cyber-attacks. The anonymous keyboard warrior, who goes by the nickname Codeine, claims to have broken into the server where the authority's site is ...

Herts and Essex Observer

Hacker cracks into Nigerian Twitter accounts
IT News Africa
The hacker is already tweeting from the Highlife singer's account @FLAVOURNABANIA and has promised to hack the accounts of D'banj, Donjazzy, Tuface, Wizkid and Banky as well as other celebrity Twitter and Facebook accounts he claims to have access to.

Flashback.G malware makes mark on Macs
SC Magazine Australia
It exploits holes in Java vulnerabilities to install the malware on a user's mac computer. In the event the user has up-to-date Java settings, the malware masks its installation using a social engineering trick, appearing as a digital certificate from ...

NoTW hacker 'had US numbers in files'
Irish Independent
By Mark Hughes in London AMERICAN telephone numbers have been discovered in the files of Glenn Mulcaire, the private investigator who was jailed for hacking voicemails on behalf of the 'News of the World', it has been claimed. Scotland Yard detectives ...

Kindsight Unveils Security Platform to Boost Mobile Operator Security Services
MarketWatch (press release)
The new offering combines network-based malware detection with a mobile device security app that scans for malicious software before it can be installed. With Kindsight Mobile Security, mobile operators are able to offer a value-added security service ...

Kim Dotcom: Hacker Extraordinaire or Degenerate?
Daily Deal Media
Kim Schmitz, began his cyber career in 1992, when there was little information about cyber security and even experts were essentially groping in the dark. He was interviewed by Forbes, on a story on Cyber crime back then. He used the lack of knowledge ...

Daily Deal Media

AhnLab Unveils Anti-APT Solution with Innovative Threat Prevention Technology
MarketWatch (press release)
AhnLab TrusWatcher allows organizations to protect their IT systems and digital assets against APT attacks, employs an automated diagnostic feature that analyzes all executable files, and executes them on virtual machines to determine unknown malware ...

Panda Cloud Antivirus 1.5.2 improves on-demand scanning speed
BetaNews
Panda Cloud Antivirus is designed to minimize its impact on system resources by tapping into cloud-based processing power to do much of the security tool's leg work in analyzing, blocking and attempting to remove malware infections.

BetaNews

I Hope We're Hacking China And Russia, Too
InformationWeek
It's been many years that we've been hearing how Chinese hacker groups, perhaps connected with their government, have been hacking into US government and industrial systems. To a lesser extent the same is true of Russian hackers, who have battle-tested ...

Are you a cyber sleuth? Test your malware IQ
InfoWorld (blog)
By Woody Leonhard Malware comes in many guises. For most people it's a constant source of irritation. But for security mavens, the malware world offers all sorts of fascinating nooks and crannies -- charlatans and characters, flashes of brilliance, ...

Qualys Introduces New Services and Major Technological Innovations to Its ...
MarketWatch (press release)
Malware Detection Service, Enterprise Edition. Built on the popular free Malware Detection service, the enterprise version will allow customers to track malware on multiple web sites with advanced reporting and notification options.

UWO election hacker facing criminal charges
Varsity
By Mohammad Arshad The hacker who disrupted the University of Western Ontario's (UWO) student union elections will be criminally charged, the university's campus police have confirmed to The Gazette. Alumnus Keith Horwood admitted to hacking the ...

Compromised websites from a site owner's perspective
Help Net Security
... able to compromise legitimate websites without the site owners' knowledge: over 90% of respondents didn't notice any strange activity, despite the fact that their sites were being abused to send spam, host phishing pages, or distributemalware.

Help Net Security

extreme geekboy: Malware and Phishing Protection in Firefox
By Sid Stamm
For a while, Firefox has included malware and phishing protection to keep our users safe on the web. Recently, Gian-Carlo Pascutto made some significant improvements to our Firefox support for the feature, resulting in much more efficient ...
extreme geekboy

Twitter Hacker Targets Flavour, D'Banj, Don Jazzy, Wizkid, Others ...
By NET
By Osagie Alonge If last night's threats are anything to go by, then celebrities using social networks like Twitter need to be very worried. Big names.
Sturvs

SyScan, a true blue hacker conference, 8th edition in Singapore in ...
By Malgorzata
SyScan, a true blue hacker conference, will be running its 8th edition in Singapore in April 2012. Known for its deep knowledge technical tracks, SyScan'12 | SyScan, a true blue hackerconference, 8th edition in Singapore in April 2012.
PenTest Magazine

r00tw0rm leak United Nations Environment ... - The Hacker News
By THN Reporter
r00tw0rm leak United Nations Environment Programme database. THN Magazine and TheHacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking threads, ...
The Hacker News [ THN ] - Updates...

Joel Grus » Hacking Hacker News
Hacker News, if you don't know it, is an aggregator / forum attached to Y Combinator. People submit links to news stories and blog posts, questions, examples, ...
joelgrus.com/2012/02/16/hacking-hacker-news/

Q&A: Hacker Historian George Dyson Sits Down With Wired's Kevin ...
George Dyson talks to Wired/cite> about the big bang of the digital universe and his new book, Turing's Cathedral.
www.wired.com/magazine/2012/02/ff_dysonqa/all/1

Hacker jailed for 'extensive' Facebook breach - Technology ...
A British student, who hacked into Facebook's internal network risking "disastrous " consequences for the website, was jailed for eight months on Friday in what ...
www.msnbc.msn.com/.../brit-hacker-jail-extensive-facebook-b...

News Corp. Hacker Said to Have U.S. Phone Numbers in His Notes ...
The former News Corp. private detective who hacked phones for the News of the World had U.S. telephone numbers among the details of British hacking victims ...
www.businessweek.com/.../news-corp-hacker-said-to-have-u-s...

avast! blog » Standard hacker tactics after Whitney Houston's death
There seems to be a playbook of standard hacker tactics after a celebrity death or an event of worldwide interest like earthquakes or tsunamis. Hours after the ...
https://blog.avast.com/2012/02/16/standard-hacker-tactics/

CIA Hunts For Malware In Binary Code - Government - Security ...
Although binary analysis tools like the company offers are widely used to find any strange code coming into the enterprise, most look for malware by identifying ...
www.informationweek.com/news/government/.../232601019

Mobile malware on the rise, McAfee Q4 Threats Report | The Hacker ...
THN Magazine and The Hacker News is Most Comprehensive resource in providing news related to Information Technology, Cyber security, infosec, Hacking ...
thehackernews.com/.../mobile-malware-on-rise-mcafee-q4.htm...

National Security Association calls hacktivist group 'Anonymous' a threat to ...
Public Radio International PRI
The hacker group Anonymous uses the Guy Fawkes mask as their logo.The NSA has warned that the hacker roup Anonymous may pose a threat to national security. (From Anroir on Flickr/flickr) In Anonymous's move away from denial of service attacks and ...

WikiLeaks Tightens Ties To Anonymous In Leak Of Stratfor Emails
Forbes
WikiLeaks founder Julian Assange wearing Anonymous' iconic Guy Fawkes mask at a London protest last October. The leaderless collective Anonymous once acted as WikiLeaks' vigilante avenger, attacking the secret-spilling group's enemies while WikiLeaks ...

Forbes

WikiLeaks publishes 5m sensitive emails stolen by Anonymous hacking group
Daily Mail
WikiLeaks did not say how it acquired access to the vast haul of internal and external correspondence of the Austin, Texas company, formally known as Strategic Forecasting Inc. But Hackers linked to the loosely organized Anonymous hackersgroup said at ...

Daily Mail

Anonymous splinter group AntiSec wages war on 'profiteering gluttons'
The Guardian
At the same time, however, an aggressive and volatile faction within Anonymous has also flourished – and that is causing a degree of internal division. Made up of a small highly skilled hacker team which carries out attacks under the name Operation ...

The Guardian

WikiLeaks publishes 5 mn emails from thinktank Stratfor
TwoCircles.net
The messages were reportedly stolen by hacker group Anonymous. The emails could unmask the US firm's "sensitive sources" and "throw light on the murky world of intelligence-gathering", the Daily Mail reported. Stratfor said the release of its stolen ...

WikiLeaks publishes e-mails from Stratfor intelligence firm
Washington Post
The e-mails, which members of Anonymous claim to have obtained in December, date from July 2004 to December 2011, according to a press release from WikiLeaks. The group claims the e-mails reveal information about what it called the US government's ...

Wikileaks Pairs with Anonymous to Publish Intelligence Firm's Dirty Laundry
Wired News (blog)
By Quinn Norton In an unprecedented collaboration between Anonymous and WikiLeaks, the secret spilling site began leaking Sunday night portions of a massive trove of e-mails from the private intelligence firm Stratfor that Anonymous obtained by hacking ...

The Week | Hacker group Anonymous could cause power outage in ...
Washington: Hacker group Anonymous within the next year or two could bring about a limited power outage in...
www.manoramaonline.com/.../theWeekContent.do?...

Hacker group Anonymous claims hit on FBI partner site
Hackers claiming allegiance to the loose-knit Anonymous movement have claimed responsibility for vandalizing an Ohio FBI partner website.
www.it-networks.org/.../hacker-group-anonymous-claims-hit-...

LiveLeak.com - Anonymous group hacks Ontario police chiefs site
Anonymous group hacks Ontario Police Chiefs website as federal government's proposed ...
www.liveleak.com/view?i=211_1330280896

cyber security - Google News

cyber warfare - Google News

cyber defense - Google News

US-CERT Cyber Security Tips

Cyber War News

Alive in the Cloud

expri.com