Fahmida Y. Rashid

Citrix Unveils Project Olympus, Commercial Version of OpenStack Cloud Platform

Citrix System has added Project Olympus, a new cloud product, to its open cloud computing portfolio to complement its Citrix NetScaler Cloud Gateway and NetScaler Cloud Bridge. Citrix Systems announced Project Olympus, a new cloud infrastructure product based on the open-source cloud operating system OpenStack, at Citrix Synergy Summit on May 25. Project Olympus will […]

Mobile Malware, Fake AV, Web Threats Dominated Q1 2011: McAfee

Cyber-criminals were busy during the first quarter of 2011, as there were more unique malware samples circulating during this time period, McAfee said. Attacks surged in the first quarter of 2011, as researchers counted six million unique malware samples, McAfee said in its first quarter Threat Report, released June 1. There were 2.75 million new […]

PBS.org Hacked With Fake Tupac News Story

A group of hackers angered by PBS Frontline’s WikiLeaks documentary posted a fake news story onto the TV station’s Website and compromised servers and databases in revenge. The group, The Lulz Boat, posted a story on the Public Broadcasting System Website that claimed Tupac Shakur was alive and well, residing in a small town in […]

Google Removes 26 Apps with DroidDream Light Malware from Android Market

The original developers behind DroidDream have added more applications to the Android Market with a stripped-down version of the original Android malware, according to a security firm. A total of 26 applications in the official Android Market were found to contain malware that can steal significant amount of personal data, Lookout Security said May 30. […]

Apple Rolls Out MacDefender Removal Tool for Mac OS X

Apple rolled out its MacDefender removal tool in its latest security update to detect and remove the fake antivirus for Mac OS X from affected systems. The OSX.MacDefender.A definition was added to the quarantine list in Apple’s Security Update 2011-003, released May 31. Once the update has been installed, the system will search for and […]

Security Obstacles Remain for Data Center Virtualization

As organizations increasingly use virtualization in their data centers, they are becoming more aware of the need for proper security to defend against threats, according to a new research report. As organizations make the shift to virtualization and cloud computing, they run the risk of introducing “new obstacles” such as inconsistent network policies and security […]

Mac Rogue AV, Mobile Security Lead Week’s Security News

Several security firms, including ESET, Intego and Sophos, raised the alarm beginning earlier this month about the proliferation of fake antivirus programs specifically targeting the Mac OS platform. These scareware programs worked in the same way as the PC variants, with users being told their computers were infected with numerous viruses. Users were scammed into […]

Russian Payment Processor May Be Behind MacDefender Scareware

It appears that a Russian online payment company may be behind the rogue antivirus MacDefender scam that has dominated security headlines for the past few weeks. A few days after the first attacks surfaced, users on Apple support forums reported that the Mac malware was directing them to mac-defence.com and macbookprotection.com to pay for the […]

LinkedIn Cookie Flaw Lets Attackers Login

LinkedIn joins the ranks of major Websites with serious security vulnerabilities that would allow attackers to access user accounts without needing passwords, a researcher said. LinkedIn’s vulnerability is directly tied into how it manages the login cookie that it downloads on to a user desktop, according to Rishi Narang, an independent security researcher, wrote on […]

IE Flaw Lets Attackers Steal Cookies, Access User Accounts

An unpatched vulnerability in Internet Explorer allows attackers to steal login credentials to various Websites via cookies, according to a security researcher. Attackers can exploit the Internet Explorer flaw to steal cookies from user computers and use the saved information to access user data. The researcher, Rosario Valotta, demonstrated the exploit at the Hack in […]