Week in review: Twitter security, VPN flaw and phone scams and DDoS
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews:
6 cloud security tips
Many enterprises are still grappling with concerns about data integrity, recovery and privacy, as well as regulatory compliance in a cloud environment. Verizon Business offers key tips to keep their data and networks safe.
Telecommunications Denial of Service attacks
The FBI released a warning to consumers concerning a new scheme using telecommunications Denial of Service (TDoS) attacks.
Lenovo’s download portal found serving Bredolab Trojan
A hidden iframe inserted in the page was redirecting users to a page where a file named exe.exe was waiting to be loaded through exploits taking advantage of many vulnerabilities in the Internet Explorer browser.
How hackers target teens
Imperva’s ADC has uncovered a new scheme targeting teens. How does it work?
Tips for protection against online identity theft
A recent study showed that while consumers recognize the importance of online privacy and security, most are not taking important protective measures to help guard their personal information.
Flaw in VPN systems nullifies its promise of privacy
Worried about your goings-on being monitored on the Internet, you have resorted to using VPN. But, is your privacy really assured?
So, it turns out that your computer doesn’t even have to be infected for you to become a target for people who offer to disinfect it – and charge you, of course!
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses phishing.
A closer look at AVG LinkScanner for Mac
AVG LinkScanner for Mac (v. 9.0) checks each Web page in real time before it opens on your Mac. It supports Firefox and Safari.
Twilight app turns mobile phones into zombies
While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon Oberheide’s demonstration at SummerCon has certainly made people think again about the relative easiness of doing such a thing.
Network Security Auditing
This book is aimed at teaching security and network professionals the assessment, prevention, detection, reaction and recovery skills they need to develop in order to be sure that their security practices are good and that they will meet the nowadays oh-so-common auditing requirements.
How much is Facebook data worth?
Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts?
Social networking “Bill of Rights” released
An almost unanimous consensus on the main points that such a bill should contain has been reached between the attendees of the Computers, Freedom, and Privacy conference.
.org becomes first generic TLD protected by DNSSEC
The active key with which some eight million owners of .org domains will be able to sign them is scheduled to be published on the 15th of July.
Twitter to establish information security program
Twitter has agreed to settle FTC charges that it deceived consumers and put their privacy at risk by failing to safeguard their personal information, marking the first case the FTC has brought against a social networking service.
Carder forum hack reveals information that can be used to track down members
After hacking the forum, the hackers posted a massive amount of information about forum members on a public file-sharing network, where McAfee’s Francois Paget stumbled upon them.
US cities with the highest malware infection rates
An analysis of more than one million malware infections in the United States shows Atlanta, Georgia and Birmingham, Alabama have the highest malware infection rates in the US.