Week in review: Identity theft, cybersecurity jobs, online fraud
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles:
Privacy issues of data collecting
Will 2010 see the beginning of a change in regulations regarding net privacy? The issue has been a matter for dispute for quite some time now, but there have been no significant steps toward dealing with it and the “enemy” is strong: money.
F-Secure protects smartphone data
F-Secure released Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe and theft control.
Criminal found through World of Warcraft
Law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals.
Twitter and Google account vulnerabilities
A security researcher discovered XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal cookies and session IDs – which could lead to a hijacking of accounts.
File-scanning services for malware writers
Until now, online file-scanning services were of no use to malware authors because they share the results with anti-virus software manufacturers. But, malware services have emerged.
25 million new malware strains in one year
The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year.
How to prevent identity theft
Basic guidelines to help you reduce the risk of identity theft, whether you are online or offline.
Top 10 application security trends
The Denim Group has announced its guidance on the top application security trends for 2010.
Modification risks from portable devices
Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are significant.
Online fraud: Avoiding the seven deadly sins
Companies transacting online can reduce the threat of fraudulent purchases or unauthorized account access by following these seven rules.
Hacking: The Next Generation
Hacking: The Next Generation explains the latest trends in hacking and gives you insight into the techniques and mindset of today’s attackers.
Cybersecurity expert: Job guaranteed
At the moment, there is a serious lack of cybersecurity experts in the U.S., so if your knowledge is up to speed, you are practically guaranteed a job.
Can a router hack expose your physical location?
The author of the first major MySpace worm has found a XSS bug in wireless routers that allowed him discover the geographic location of the user without using IP based geolocation or browsers’ geolocation features.
Privacy rights under attack
Privacy has become an increasingly fluid concept with the advent of social networks. Have you thought about potential consequences of sharing your life online?
Your files held for ransom
F-Secure alerts about the latest scheme that tries to make you buy rogue software to “repair” your “corrupted” files.