category
Cybercrime

Adobe breach far bigger than thought – 38 million records, Photoshop code leaked in attack

Previously, it had been estimated that around three million users had data accessed, but a new report by Brian Krebs of KrebsonSecurity revealed the true scale of the breach may have been far larger than thought – and that source code for software such as Photoshop may also have leaked.

President Obama’s Twitter and Facebook accounts hijacked by hacktivist group

President Obama’s Twitter and Facebook accounts were briefly compromised this week – with two Tweets and one post altered to send links to video montages of terrorist attacks.

Rogue’s gallery? New app aims to “out” cybercriminals who prey on online daters

A new app, Truly.am, aims to put a stop to a fast-growing area of online fraud – online dating scams – by forcing cybercriminals to prove they are who they say they are.

Rebuffed! Social site Buffer fights off onslaught of fruity weight-loss spam

An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.

Cyberattack in Israel “shuts down” road for hours

Attackers used a Trojan program to target a security camera system in the Carmel Tunnels toll road in Haifa, shutting down the road for hours, and causing “hundreds of thousands of dollars” in damage.

PHP site WAS serving malicious code, owners admit after Google raises red flag

When Google’s Safe Browsing service said that programming site PHP.net was hosting and serving malware, it sparked furious discussion – but the site investigated, and has since admitted a Javascript attack, and moved to “clean” servers.

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That’s what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Millions at risk as guest information from hotel Wi-Fi provider “goes on sale” in China

A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China – including phone numbers, dates of birth and addresses from hotel guests who logged in to networks in their rooms.

Cyberattacks against major firms “double in one year”, report warns

Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll – and the target is often information, rather than cash.

Adobe hackers behind breach at PR Newswire – but company claims “no fake releases” have gone out

The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen – but claims hackers have not sent out “fake” releases, which can be used to manipulate financial markets.

Indonesia overtakes China as leading source of cyberattacks, Akamai reports

Cyberattacks seem to be a growth industry in Indonesia, with the region having pushed China off the top spot as the leading source of attack traffic in the last quarter, according to internet services provider Akamai.

Law “may need longer arm” to tackle international cyber gangs, British police chief admits

Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit has admitted – and says he will discuss the issue with government if necessary.

Some D-Link routers contain “backdoor” which allows remote access, researcher warns

Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.

The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store

A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.

EU cyber agency warns of “outdated” systems in power plants – and suggests new safety measures

Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure – and action is needed to ensure nations stay safe, the EU’s cyber security agency ENISA said today.

Ponemon study shows costs of cybercrime still rising – each attack now costs $1 million

The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the Ponemon Institute. Each cyberattack now costs companies nearly $1 million to resolve, on average – and the annualized cost to a sample of U.S. organizations was $11.56 million.

Waking Shark: Banks to face biggest cyber war game ever in UK

A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of banks, markets and payments systems against a simulated “major” attack by cybercriminals.

Internet Explorer vulnerability will finally be patched on Tuesday after “months” of attacks

Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has been exploited by attackers “for months” according to some reports.

Acrobat in hands of hackers, millions of customer details stolen, as Adobe admits to “unprecedented” breach

Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.

“One click, then boom”: Spear-phishing could “black out” energy companies, expert warns

Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned – and all it takes is one lucky strike to cause devastating damage to the power grid, or to companies which supply oil and gas.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
30 Oct 2013
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.