January 14, 2013
Rocra Espionage Malware Campaign Uncovered After Five Years of Activity
For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and infecting more machines in an espionage campaign rivaling Flame and others of its ilk. The campaign, called Rocra or Red October by researchers at Kaspersky Lab, focused not only on workstations, but mobile devices and networking gear to gain a foothold inside strategic organizations. Once inside, attackers pivoted internally and stole everything from files on desktops, smartphones and FTP servers, to email databases using exploits developed in China and Russian malware, Kaspersky researchers said.
Image via Securelist

Rocra Espionage Malware Campaign Uncovered After Five Years of Activity

For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and infecting more machines in an espionage campaign rivaling Flame and others of its ilk. The campaign, called Rocra or Red October by researchers at Kaspersky Lab, focused not only on workstations, but mobile devices and networking gear to gain a foothold inside strategic organizations. Once inside, attackers pivoted internally and stole everything from files on desktops, smartphones and FTP servers, to email databases using exploits developed in China and Russian malware, Kaspersky researchers said.

Image via Securelist

August 14, 2012

Locking Down and Securing Your iPhone

Considering the rapid  proliferation of smartpones and tablets and the vast wealth of personal and financial data many of us store on them, it is increasingly important that we find ways of securing our mobile devices. With that in mind, we decided there was no better way to kick-off a series of security tutorials than with a short step by step video explaining simple ways of securing your iOS device.

Check Threatpost for more original videos moving forward

July 25, 2012

Ted Talk: Your phone company is watching

What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code — a detailed, nearly minute-by-minute account of half a year of his life.

 

June 12, 2012
Tumblr Users Should Beware of Cookie Thieves

May 7, 2012
How Cyber Secure are Public Companies?
Infographic via Veracode
You should also check out Threatpost’s ongoing 5-part series with Veracode’s Fergal Glynn.
A CISO’s Guide To Application Security - Part 1: Defining AppSec
A CISO’s Guide To Application Security - Part 2: The Growing Threat to Applications
A CISO’s Guide To Application Security - Part 3: Toward an AppSec Center of Excellence
A CISO’s Guide To Application Security - Part 4: Weighing AppSec Technology Options

How Cyber Secure are Public Companies?

Infographic via Veracode

You should also check out Threatpost’s ongoing 5-part series with Veracode’s Fergal Glynn.

A CISO’s Guide To Application Security - Part 1: Defining AppSec

A CISO’s Guide To Application Security - Part 2: The Growing Threat to Applications

A CISO’s Guide To Application Security - Part 3: Toward an AppSec Center of Excellence

A CISO’s Guide To Application Security - Part 4: Weighing AppSec Technology Options

11:20am  |   URL: http://tmblr.co/Z1C9jxL2RRU_
  
Filed under: security apps technology 
April 30, 2012
Infographic via The Electronic Frontier Foundation
The Cyber Intelligence Sharing and Protection Act recently passed the U.S. House of representatives. The EFF was a vocal critic of the bill (before it was cool), and they put this graphic together. It concisely explains the shortcomings in the US Government’s latest attempt at reining in cybersecurity.

Infographic via The Electronic Frontier Foundation


The Cyber Intelligence Sharing and Protection Act recently passed the U.S. House of representatives. The EFF was a vocal critic of the bill (before it was cool), and they put this graphic together. It concisely explains the shortcomings in the US Government’s latest attempt at reining in cybersecurity.

April 24, 2012
Russian Mafia Organizes to Double Cybercrime Profits in 2011
Infographic via Group-IB
Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

Russian Mafia Organizes to Double Cybercrime Profits in 2011

Infographic via Group-IB

Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

April 24, 2012
Russian Mafia Organizes to Double Cybercrime Profits in 2011
Infographic via Group-IB
Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

Russian Mafia Organizes to Double Cybercrime Profits in 2011

Infographic via Group-IB

Russian mafia and other criminal organizations were at the helm of a cybercrime industry that doubled its value in 2011, according to a new report from the Russian security firm Group-IB.

March 27, 2012
A Visual Analysis of the Taidoor Trojan
via Symantec

A Visual Analysis of the Taidoor Trojan

via Symantec

March 23, 2012
2011 Sampling of Security Incidents by Attack Types, Time, and Impact
via IBM’s X-Force Trend and Risk Report
Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

2011 Sampling of Security Incidents by Attack Types, Time, and Impact

via IBM’s X-Force Trend and Risk Report

Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

Liked posts on Tumblr: More liked posts »