archives
April 2010

Shadows, Skinless Cats And Fired Up Bulls

There have been recent reports that University of Toronto researchers have been observing the workings of a cyber-espionage botnet. This botnet, called the "Shadow Network", appears to be a network that targeted government, business and academic computers at the United Nations and the Embassy of Pakistan in the US, among others including the Office of

Insider Threat: Malware on your ATM

  Insider Threat – your ATM may now be hacked from the inside. According to Wired’s Threat Level Blog… A Bank of America worker installed malicious software on his employer’s ATMs that allowed him to make thousands of dollars in fraudulent withdrawals, all without leaving a transaction record, according to federal prosecutors. According to the

HR 4061: What Three Bucks buys you…

According to the CBO report quoted in this graphic, three dollars from every citizen of the United States each year for four years is what the final cost will be. We’re talking about the amped up Cybersecurity Enhancement Act of 2010 (HR 4061) currently passed by the House of Representatives. This can easily be confused

From Megatons to Megapings: Cyberwarfare

A bit of news this week dealt with Cyberwarfare. Far from becoming part of the tinfoil hat crowd, cyberwarfare has been growing in real world relevance in the past eighteen months and is the primary impetus for pending legislation. While in the Cold War, detente could be measured in the megatonnage of nuclear weapons, the

Polish Air Accident and Blackhat SEO

Thanks to Marcin Gajewski for pointing out that Lech Kaczynski was the President of Poland, not the Prime Minister. I really shouldn't try to blog after a full day's travelling :( While I was enjoying a rare few days off, my colleagues at ESET Latin America were posting a blog article about the ugly way in

Spam, Bad Guys, and the Russian FSB

Interesting news this week with some heavy anticrime work in Russia resulting in the arrests of the alleged RBS Worldbank cybercriminals. In related research I had to laugh out loud at this particular turn of phrase reported by the Financial Times; The Russian Federal Security Service (FSB)has detained suspects including Viktor Pleshchuk, an alleged mastermind

Congratulations Bruce Schneier

According to CRN, Schneier is the official rock star of the security industry. Security Superstars 2010: Visionaries

Senate Bill 773: What it means for Cyber Security and Cybercrime

Allow me to frame the threat of cybercrime that we all face by quoting from Jeff Debrosse’s 2009 Cybersecurity Review white paper: Cybercriminals are global and often well organized. They are smaller and more maneuverable than most corporations. Some are sheltered by certain G8 economic countries’ policies and laws. Their thefts fuel their home country’s

iAds Come to the iPhone

Enterprise Mobile Today http://www.enterprisemobiletoday.com/news/article.php/3875521/Apple-Unveils-Key-iPhone-Upgrade.htm ran a story about some upgrades to the iPhone. There are a number of features in iPhone OS version 4. The operating system being able to multitask, like Android and other smartphones do. Corporate administrators will be able to push out updates instead of users being required to use iTunes to

Conroy’s Folly

For about 18 months now, the Australian government has been planning to spend over A$40 million on a compulsory national Internet filter. This filter seems to have come about as a result of a few very conservative and naive people talking into the ear of Stephen Conroy, the Federal Minister for Broadband, Communications and Digital

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2013 ESET, All Rights Reserved.