Fahmida Y. Rashid

OpenDNS Launches DNS-Based Malware Protection Service for Enterprises

OpenDNS, the domain name resolution service, launched a DNS-based malware protection service in its enterprise offering that’s designed to detect and block infected computers from communicating with command-and-control servers. This security service for enterprises will examine all DNS activity on the organization’s network and block any traffic going to a known malicious site, David Ulevitch, […]

Attackers Compromise 1.3 Million Sega Users

Hackers took down Sega’s online gaming service and compromised accounts belonging to 1.3 million customers, the video game company confirmed June 17. Cyber-attackers launched a denial-of-service attack and forced Sega Pass service, a subscription-based platform that allows gamers to play unlimited Sega games online, to shut down on June 16. A “subset” of Sega Pass […]

ICANN Approves Custom Generic Top Level Domains

The organization that governs Website domain suffixes has voted to allow new top-level domains that can be whatever the domain owner wants-for a price. The custom suffixes will allow domain names to end with almost any word and in any language, ICANN (Internet Corporation for Assigned Names and Numbers) said June 20 following a vote […]

BitCoins Heist Worth $8.75 Million

Attackers going after virtual currency are raking in real dollars. A megaheist over the weekend exposed hundreds of user accounts and stole approximately $8.75 million worth of virtual money. BitCoin is a form of virtual currency popular with users for online trading. Its peer-to-peer network does not attach any identities to the funds being transferred, […]

SCADA Vulnerabilities Patched in Industrial Control Software From China

A security researcher discovered several vulnerabilities in industrial control systems software from China that can be exploited remotely. The vulnerabilities can be used to knock out or take over SCADA (supervisory control and data acquisition) systems from Chinese firm Sunway ForceControl Technology, the U.S. Department of Homeland Security’s Industrial Control Systems Cyber-Emergency Response Team said […]

Poisoned iCloud Search Results Lead to Fake Antivirus Pages

Businesses and analysts aren’t the only ones interested in Apple’s upcoming iCloud service. Scammers are moving in on the action to deliver fake antivirus software. Cyber-criminals have already used black-hat search engine optimization techniques to poison search results for the “iCloud” keyword, Paul Pajares, a fraud analyst with Trend Micro wrote June 20 on the […]

Password Security Remains the Weakest Link Even After Big Data Breaches

Despite repeated reminders to select strong passwords and not to reuse them across Websites and services, online users continue to be frighteningly lax in their password security, according to a recent analysis of leaked passwords. Security experts recommend taking a multilayered approach to security. Instead of relying on a single point of failure, organizations should […]

Attackers Exploiting Recently Patched Adobe Flash Flaw

Attackers are actively exploiting a Flash vulnerability that Adobe just released a fix for in its quarterly security update a few days ago. Security Labs blog on June 17. It is being exploited in the wild on a “fairly large scale,” Shadow Server’s Steven Adair wrote, noting that the team first learned about the exploit […]

RSA Executive Reveals More SecurID Breach Details

MALAGA, Spain – An RSA Security executive discussed in greater detail the data breach the company suffered earlier this year during a panel on zero-day attacks. During the attack, which RSA disclosed in March, thieves stole information related to the RSA SecurID two-factor authentication technology. It turns out that only four employees received the spear […]

Go to Account > Privacy Settings

Go to Account > Privacy Settings Strangely enough, the recommended settings for privacy on Facebook are not very private at all. If you are interested in having some semblance of privacy on Facebook, go for custom to be able to tweak each setting individually. Groups Can Customize Settings If the user has created groups in […]