Fahmida Y. Rashid

Fake LinkedIn Messages Install Zeus Malware on Victims’ Computers

Prospective employers and job applicants aren’t the only ones using LinkedIn for research. Cyber-criminals are increasingly using the social networking site for professionals to identify potential victims, according to security experts. Security firm Trusteer uncovered spam messages designed to look almost the same as legitimate notification messages from LinkedIn, Trusteer CEO Mickey Boodaei wrote on […]

LulzSec Arrest Rumor Debunked

The hacker group LulzSec denied that one of its members was in FBI custody hours before it released more information illegally obtained from Sony’s servers. According to a post on the Full Disclosure mailing list on June 6, a member of the hacker group who’d been behind various attacks on Sony, Nintendo, FBI-partner Websites, PBS.org […]

Adobe Patches XSS Zero-Day Flaw in Flash Used in Google Gmail Attack

Adobe announced and patched a cross-site scripting vulnerability in Flash that is already being exploited in drive-by download attacks. Adobe released the out-of-cycle update for Flash addressing the security flaw on June 5. The company found out about the bug on June 3 and managed to develop and release a patch over the weekend. The […]

Amazon Web Services Hosting Banking Malware: Kaspersky

Security researchers have long warned that cloud services were providing cyber-criminals with extensive computing resources that could be used to launch powerful and damaging cyber-attacks. A Kaspersky researcher uncovered an example of how Amazon’s cloud services are being used to spread malware. A cloud instance on Amazon Web Services had links that pointed to “financial […]

Advantages of Open Source

Advantages of Open Source For the first time, lowering software costs is not the main advantage enterprises are looking for when using open-source technology. Avoiding vendor lock-in and buying higher quality software are top advantages, too. Open-Source Adoption Drivers The survey found that government/public sector validation is a tipping point, encouraging organizations to use open-source […]

Sony, Nintendo, FBI-Partners Hit by Latest LulzSec Hacks

Almost two months after the massive attack on Sony, which compromised more than 100 million user accounts, the attacks keep coming. Sony was hit again, as was fellow gaming company Nintendo. A group of hackers going by the name LulzSec attacked Sony Pictures Entertainment June 2, Websites affiliated with the Federal Bureau of Investigation June […]

Prominent iPhone Hacker Blames Vendors’ Buggy Code for Security Breaches

Security researcher Charlie Miller will deliver the keynote speech June 9 at the International Conference on Cyber Conflict. The conference, in its third year, is sponsored by the NATO Cooperative Cyber Defence Center of Excellence and will take place in Estonia. Miller’s keynote, entitled “Why the Bad Guys are Winning the InfoSec War,” will use […]

Apple Hires Jailbreak Developer

Who says jailbreaking doesn’t pay? Apparently it paid off big-time for a software programmer who built a notification app for the iPhone that’s better than the one from Apple. Apple hired Peter Hajas, the developer behind the “MobileNotifier” application for jailbroken iPhones, AppleInsider confirmed June 3. Hajas had stopped work on the app some time […]

World IPv6 Day Signals Time to Modernize the Internet

The Internet Society, an international nonprofit organization that advises on Web standards, policy and education, has declared June 8 World IPv6 Day to give enterprises and ISPs a chance to “stress test” the next-generation Internet protocol to see what works, what breaks and what they need to do to seamlessly migrate their networks to IPv6. […]

Mac Rogue AV, Defense Contractors, Phishing Lead Week’s Security News

May 2011 is the month Apple and its legion of Mac users were forced to acknowledge that there was nothing natively secure about the Mac OS X when it came to malware. In response, Apple rolled out its promised MacDefender removal tool this week. The tool was actually an updated File Quarantine, a little known […]