An intrusion at online dating service Cupid Media earlier this year exposed more than 42 million consumer records, including names, email addresses, unencrypted passwords and birthdays, according to information obtained by KrebsOnSecurity.
Continue reading “Cupid Media Hack Exposed 42M Passwords”
Some Critical Success Factors for a Business Continuity Initiative
Business continuity initiatives should be able to meet management and customer expectations in case of a disaster. Here are some pointers to help you towards that goal:
Continue reading “Some Critical Success Factors for a Business Continuity Initiative”
Android Banking Trojan Svpeng Goes Phishing
Kaspersky Lab researchers say the Android banking Trojann Svpeng now has phishing capabilities and may be testing the waters to infect devices outside of Russia.
via https://threatpost.com/android-banking-trojan-svpeng-goes-phishing/102822
Another Master Key vulnerability discovered in Android 4.3
via https://thehackernews.com/2013/11/another-master-key-vulnerability.html
Singapore on alert for cyber attacks after websites hacked
Singapore’s government has been put on heightened alert for cyber attacks after people claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action.
via https://www.topix.net/tech/computer-security/2013/11/singapore-on-alert-for-cyber-attacks-after-websites-hacked?fromrss=1
Who monitors your every move? NSA or Facebook or Shutterstock?
Monitoring, eveasdropping, spying, surveillance – these are terms that even the layman today associates with NSA – thanks to the recent spate of exposes about who and what the NSA has been monitoring. One assumes that when European heads of state have not been spared, others are just too easy. While the NSA may not have any real interest in what I do, other conglomerate websites like Facebook and Shutterstock have a very real interest in how I behave with their websites – since it might mean more money for them.
Continue reading “Who monitors your every move? NSA or Facebook or Shutterstock?”
BetaBot – The new malware kid off the block
A new warning about malware designed to target payment platforms highlights why anti-virus software is increasingly ineffective at preventing account compromises. And while this new Trojan is not yet targeting online-banking accounts, financial institutions should be aware of the threat. Continue reading “BetaBot – The new malware kid off the block”
Free guide: 5 Best practices for BYOD
Trend Micro Incorporated has issued a free how-to guide that covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy.
iPhones, iPads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These devices offer greater flexibility and adaptability — whether it’s for business or private use. But these devices also put proprietary company information at risk. Ideally, consumer devices can extend and supplement desktop and laptop machines, allowing employees to remain connected to the organization without being chained to a physical office. Incorporating consumer technology into a corporate IT system requires planning, policy, protection, and control.
You can request your copy at https://net-security.tradepub.com/free/w_aaaa2710/?p=w_aaaa2710
Qatar websites hacked for several hours
Several Qatar websites carrying the .qa domain name were hacked for several hours on October 19th.
Read more at Dohanews
