Cyber Attacks

What to expect in 2013

According to Sophos CTO Gerhard Eschelbeck, modern malware has become extremely effective at attacking new platforms and that explains why we are experiencing a rapid growth of malware attacking mobile devices. While malware for Android was just a lab example a few years ago, it has become a serious and growing threat. Sophos Security...
Read more »

Tags: , , , ,
Posted in Cyber Attacks | No Comments »

Attackers Tools for Security Pros

Security professionals are tasked with the responsibility of securing systems and networks, and finding weaknesses that may be exploited by cyber criminals. Furthermore, security pros need to be aware of the capabilities of hacking tools and techniques used by attackers. Simply put, they need to try out these tools against a test environment to...
Read more »

Tags: , , , , , ,
Posted in Cyber Attacks | No Comments »

Multiple critical vulnerabilities in Sophos products

A technical paper by Tavis Ormandy describes the process a sophisticated attacker would take when targeting Sophos users. By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a responsibility to uphold the highest secure development standards possible to minimise the potential for harm caused...
Read more »

Tags: , , ,
Posted in Cyber Attacks | No Comments »

September Global DDoS

Watch September’s DDoS attacks as detected and recorded by Team Cymru, highlighting the top 7 most attacked countries and revealing a few surprises along the way. This is a video series where in the second movie, Team Cymru focuses on African issues: such as, what malicious activity is occurring and where, for a one...
Read more »

Tags: , , ,
Posted in Cyber Attacks | No Comments »

Google Play services and OAuth 2.0

Google will make OAuth 2.0 authorization available to Android apps as to allow apps leverage the built-in security features of the OAuth 2.0 protocol. OAuth 2.0 protocol can help in mitigating attacks and security incidents. Google Play services has just started rolling out, and even after the rollout is complete, will only be available...
Read more »

Tags: , , ,
Posted in Cyber Attacks | No Comments »

New IE 7 and IE 8 0-day Vulnerability

Following the discovery of the Java SE 7 0day exploit, a French security researcher by the name of Eric Romang took to task an intensive research related to infected servers used by the alleged Nitro gang. During his research, Eric discovered four files on an infected server which he claims could potentially be related...
Read more »

Tags: , , , , , , ,
Posted in Cyber Attacks | No Comments »