Fahmida Y. Rashid

IPv6 Transition Still a Low Priority for Most Organizations

Despite the increased interest and awareness in IPv6, companies are still just talking about making the switch, according to recent research studies. Since IANA (the Internet Assigned Numbers Authority) distributed the last remaining blocks of IPv4 addresses to the individual regional Internet registries in February, signaling the depletion of available IP addresses, the clock has […]

EU e-Privacy Cookie Rules Will Impact Non-European Web Companies

The European Union’s new data privacy rules requiring companies to obtain explicit customer consent before displaying targeted Internet advertisements will impact any Web enterprise that has customers within the EU. The data privacy rules, an amendment to the European Union’s Privacy and Electronic Communications Directive, will go into effect May 26. Intended to give Web […]

Sony Server Hijacked in Credit Card Phishing Scam

Attention Sony: Cyber-criminals are using one of your servers to run a phishing site. Criminals had set up a phishing site imitating an Italian credit card company on a domain belonging to Sony Thailand, F-Secure researchers discovered. Users are encouraged to enter in all of their personal data to apply for a new credit card, […]

Sony Patches Another PlayStation Network Security Flaw

Sony plugged a security hole that could have allowed hackers to gain control of accounts on the PlayStation Network and Qriocity music and video service, the company said. The latest security hole was found on the Webpage that users were using to reset passwords for their PSN and Qriocity accounts from their PCs, according to […]

Open-Source Software Going Mainstream in Enterprises: Survey

Businesses are becoming more confident about deploying open-source technology within the enterprise, instead of relegating it to the fringes or for experimental projects, according to a recent survey. A significant majority of surveyed respondents, or 95 percent, said their organizations are using open-source technology to avoid vendor lock-in, according to the Future of Open Source […]

Siemens, DHS Ask Researcher to Cancel SCADA Vulnerabilities Talk

A planned presentation on security vulnerabilities in Siemens industrial control systems was pulled at the last minute because the information was deemed too dangerous. Independent security researcher Brian Meixell and Dillon Beresford, with NSS Labs, had been scheduled to discuss problems in Siemens programmable logic controller systems at the TakeDownCon in Dallas on May 18. […]

Google Silently Patches Android Authentication Flaw

Google is planning to fix a security issue that could potentially allow hackers and cyber-crooks to access the personal information of people who use the company’s Android mobile operating system. Google plans to push out the fix within the next week. Researchers at Germany’s University of Ulm originally found the vulnerability and published their findings […]

Database Security Faces Greatest Threats from Insiders, Human Errors: Study

Database professionals see malicious insiders and human error as the biggest risks to database security, not external intruders, according to a recent research study. In a study of 216 members of the International Sybase Users Group, more than half of the respondents felt that human error was the biggest risk to the organization’s data security, […]

Virus Causes Data Breach at Massachusetts Unemployment Agency

Cyber-criminals may have used malware to steal personal information from the Massachusetts unemployment offices, according to the state agency. As many as 1,500 computers in the Departments of Unemployment Assistance and Career Services were infected with a virus beginning April 20, the Massachusetts Executive Office of Labor and Workforce Development said on May 17. Computers […]

99% of Android Devices Harbor Authentication Flaw on Open WiFi Networks

Most devices running Google’s Android operating system are vulnerable to a man-in-the-middle attack that would allow adversaries to access victims’ personal data stored in Google services, warned a group of university researchers. Malicious individuals can intercept authentication tokens from Android users running applications over an unsecured WiFi network, said researchers from Germany’s University of Ulm […]