Blippy recently had a small data breach which merely underscored the risks of a growing segment of social networks which showcases your toys… How a burglar or other thief sees Blippy: Securing Our eCity Contributing Writer
Archives - May 2010
Of course, most vendors use in-house testing as a tool for monitoring and improving the capabilities of their own products. However, it’s also being used increasingly as a vehicle for showcasing a company’s own AV products in the best possible light.
Recently we blogged here about some new Facebook privacy controls. I decided to check and see if the new controls were rolled out. The first thing I noticed was that Facebook noticed I was not logging in from my normal location and wanted to ask me a few “security questions”. Hmmm, ok. The first security
There was a bit of a stir today around a British scientist, Dr. Mark Gasson. In the BBC article Dr. Gasson was touted as the “First Human ‘Infected With a Computer Virus’”. I let this one stew around for a few seconds and I have to say that this isn’t what it’s cracked up to
In the survey, banks that were notifying consumers as quickly as possible or immediately across multiple channels performed well [and] they also improved cardholder confidence. Notifications over multiple channels were also significant.
Mashable reports a halt to the insanity over privacy may be only a day away… On Sunday, Facebook CEO Mark Zuckerberg promised simplified privacy settings “in coming weeks.” It now looks like that timetable has been bumped up, with an executive at the social network revealing at an event in New York that new features
I’m not always in alignment with Jeffrey Carr’s point of view but in this he is spot on. Succinct and to the point, Jeffrey Carr addresses cybercrime, cyberwarfare rules of engagement and forecasts the United States’ rapid decline: Should these trends continue unabated, we will have no one to blame but ourselves as the economical
Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is being used for more command and control functionality. As soon as it becomes available, we’ll follow up. :)
So, this is the first blog entry I have ever written and posted from an airplane. Until the end of July, Alaska airlines has free wi-fi on some of their flights. Not all of the planes are wi-fi enabled. The provider is called GoGo. One of the first things I noticed is that even though
Brian Krebs, source of a lot of key research on the banking trojan focus on small to medium sized business, has reported that cyber-vigilantes have rattled the cage of a major carder site by posting their member’s passwords: Ironically, the anonymous authors of the e-zine said they were able to compromise the criminal forum because
What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.
Forbes contributor Richard Stennion doesn’t like the Cybersecurity Act of 2010 very much. We know it around here as S. 773 and have been tracking it for some time. Mr. Stennion and I disagree on some key points. He says that S. 773: “…contains some pretty drastic measures that are going to be very disruptive,
According to the Navy Times today, the Cyber Command is up. “The nascent command charged with operating the nation’s military computer networks is now a reality, the Pentagon has confirmed.” “U.S. Cyber Command, a subordinate unit of U.S. Strategic Command, was launched Friday afternoon at Fort Meade, Md., in a status officials called an initial
I don’t really want to leave ESET, but IBM needs me. Several years ago Microsoft had a serious problem with viruses in its software. I was given the task of making it go away. It started with retail software. My job was to make sure none of the retail software Microsoft released was infected. Then
Juraj Malcho, Head of Lab at Bratislava, reports: We've just encountered what appears to be a new Facebook scam in the wild. As of this moment we haven't seen any malicious content being served, but the content is changing even as I’m writing this post and it’s likely to serve malware soon. It spreads by adding
Our research colleagues in South America have found that there is considerable effort by the bad guys to try to infect your computer when you search for information about the 2010 world cup games. Specifically, if you are searching for free tickets. The bad guys know that people searching for free tickets to the World
Autorun and Windows 7. Long time readers know that I think autorun was Microsoft’s longest unpatched vulnerability. For Windows 7 Microsoft has made some serious improvements, but for older versions of Windows Microsoft has ignored the obvious vulnerability and only offered the patch as an optional download instead of making it a critical update, as
OK, perhaps this is a grumpy old man moment… Today I received a magazine through the post that included a flyer for the AIIM 2010 roadshow. AIIM, formerly the National Microfilm Association and later the Association for Information and Image Management (hence AIIM) describes itself as "the community that provides education, research, and best practices
[I told you these links were cursed: thanks to Daniel Schatz for pointing out a further problem. Tip of the hat to Kurt Wismer for pointing out the issue on the AMTSO blog, and another to Julio Canto for alerting me to the story in the first place.] Danny Quist posted an interesting article at
[Update: Alex Matrosov has posted screenshots of the Twebot update at http://twitpic.com/1ousmx and http://twitpic.com/1ouse5.] Juraj Malcho, the Head of our Lab in Bratislava, reports that there have been further developments regarding the tool for creating Twitter-controlled bots described by Jorge Mieres and Sebastián Bortnik, Security Analysts at ESET Latin America, in an earlier blog at http://www.eset.com/blog/2010/05/14/botnet-for-twits-applications-for-dummies.