News

Hackers Target Email, Blogs, Social Networking Sites

Date: 18 Feb 2010 | Posted BY: ulisticadmin

In a report by security firm Websense, an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media sites such as blogs and wikis. Social media or so-called Web 2.0 sites allow user-generated content, which can be a source of vulnerability. Researc

Mozilla Firefox Add-Ons Download Site was Harboring Malware

Date: 16 Feb 2010 | Posted BY: ulisticadmin

Mozilla, the organization behind the popular Firefox browser disclosed that two add-ons available for download on its website were vectors for Trojans that could compromise users’ computers. Add-ons allow users to extend and enhance the capabilities of Firefox beyond the default install. Normally they are scanned for malware before being uploaded onto Mozilla’s website, but apparently two of t

Are you using an Insecure Password?

Date: 03 Feb 2010 | Posted BY: ulisticadmin

Security firm Imperva recently released a warning to users of popular social networking website RockYou indicating that their accounts and passwords may have been compromised. According to the firm, a hacker may have accessed an alarming 32 million accounts. But what is more interesting in the wake of this news is an analysis made of the accounts and passwords stolen. From the data provided to res

Chinese Hackers Exploit IE Vulnerability in a Concerted Attack – Make Sure your Browser is Protected

Date: 31 Jan 2010 | Posted BY: ulisticadmin

Early January, Google released a report detailing attacks on its infrastructure which it claimed to have originated from China. In the wake of its announcement, another report came out detailing what is purported to be an “organized espionage operation” originating from China. Known as “Operation Aurora”, the attack attempted to siphon information from 33 companies in the US, including Goo

RealPlayer Users Beware

Date: 28 Jan 2010 | Posted BY: ulisticadmin

RealNetworks, developers of RealPlayer, a popular real-time streaming media player, recently released an advisory about vulnerabilities that when exploited could trigger remote code execution attacks. The firm reports at least 11 critical vulnerabilities that expose Windows, Mac, and Linux users to malicious hacker attacks. RealPlayer is a favorite target for malware and fraudware writers, and use

Phishing Alert for QuickBooks Customers

Date: 23 Jan 2010 | Posted BY: ulisticadmin

IMPORTANT UPDATE FOR QuickBooks Customers: Intuit is receiving reports of individuals receiving fraudulent emails from QuickBooks or QuickBooks Online. The two separate emails ask customers to either download a plug in to assess their security or download a Digital Certificate. Customers should delete either of these emails. As we discover these fraudulent sites (cyber criminals often use the same

Majority of firms struggle with security as new technologies are adopted

Date: 25 Nov 2009 | Posted BY: ulisticadmin

New research from the Ponemom Institute and Lumension, shows that a majority of firms are struggling to secure data as users quickly adopt new and emerging technologies such as mobile, cloud computing, and collaborative Web 2.0 technologies. The study, which surveyed IT security and IT operations practitioners, shows that many (44 percent) feel that their IT network is less secure than a year ago

Cyber-crime through the ACH system continues to spread

Date: 18 Nov 2009 | Posted BY: ulisticadmin

If you are using an automated clearing house (ACH) system to manage your funds, then you had better be extra careful. The Federal Bureau of Investigation (FBI) has warned ACH users – particularly small businesses – to be on the lookout for ACH system fraud, which has already scammed as much as $100 million from unsuspecting victims. The FBI is working with the National Cyber Forensics and Trai

Survey Shows Poor Security Awareness Among SMBs

Date: 16 Nov 2009 | Posted BY: ulisticadmin

The National Cyber Security Alliance (NCSA) and  Symantec recently released the results of a survey they did as part of National Cyber Security Awareness Month to assess the awareness and preparedness of small businesses (51 or fewer employees) in countering cybersecurity threats. Some notable findings: Only 28% have formal Internet security policies in place Only 25% provide even minimal I

Mind Your Manners! Etiquette for the Electronic Age

Date: 02 Oct 2009 | Posted BY: ulisticadmin

From the heavyset computing devices of Charles Babbage to today’s simple novelty items, electronic devices and gadgets have become smaller, more functional, and more integrated into our daily lives. With mobile phone calls, SMS, and email we are seemingly in constant need to be in touch with other people electronically. And therein lies the problem. Many people seem to put such a high priority