Security

Thu
13
Dec
Dennis Faas's picture

Samsung HDTVs Vulnerable to Zero-Day Hack

A security researcher says he's found a major vulnerability in Samsung's new high-definition Smart televisions that could transfer control of a TV from the person with the remote control to an unknown, distant hacker. Smart TVs are, arguably, the ... most advanced HDTVs on the market right now. They provide viewers with a high-resolution Light Emitting Diode (LED) screen capable of displaying two- and three-dimensional video, and they also give users access to downloadable applications, including Facebook, Twitter, and Google Maps. These capabilities have made Smart TVs hot items with the deep ... (view more)

Wed
12
Dec
Dennis Faas's picture

System Guesses 350 Billion Passwords Per Second

A newly-unveiled password-cracking system can reportedly guess billions of unique passwords every second. At that rate, it's entirely practical to have the device attempt every possible eight-character Windows password. The password-cracking system ... is a Linux-based graphical processing unit (GPU) 'cluster' that uses a special type of virtualization software which allows it to use not one, not two, but 25 Advanced Micro Devices (AMD) Radeon graphics cards. 350 Billion Passwords Guessed Each Second That kind of GPU power enables the cluster to guess passwords at an astonishing rate: 350 billion ... (view more)

Wed
12
Dec
Dennis Faas's picture

Hackers Hold Medical Records Hostage

A group of hackers has gained access to an Australian medical center's electronic patient records. Until they receive a cash payout, the hackers say they won't relinquish control of the information. It's relatively common for hackers to access ... sensitive data and then threaten to expose it unless a victim pays up. There have been several cases where scammers have remotely installed viruses on computers, then threatened to wipe the hard drive of all its stored data unless they receive hefty payments. But this case, involving the Miami Family Medical Center (MFMC), is different. Rather than ... (view more)

Tue
11
Dec
Dennis Faas's picture

Hackers Prefer Android to Windows: Report

Leading security firm Sophos has revealed that Google's Android operating system (OS) -- and not Microsoft's Windows -- is now the favorite operating system for hackers to target. Sophos revealed that finding in its newly released 2013 Security ... Threat Report. The firm says that during a three-month time frame, one in every ten Android-based devices was the target of some kind of malware attack. By comparison, only six per cent of Windows devices were targeted by hackers and other purveyors of malware. (Source: forbes.com ) This is the first time since the 1990s that Windows has not been the ... (view more)

Mon
10
Dec
Dennis Faas's picture

Ransomware Schemes Expanding, Intensifying: Report

According to recent reports, the number of 'ransomware' scams being used to scare computer users into giving up some of their money is increasing. Security experts believe at least sixteen different organizations are using sophisticated schemes like ... this to extort money from people in Europe. The number of groups trying the same basic scam stateside also appears to be growing. A ransomware scam involves installing malicious software on a targeted computer and then blocking access to that computer until the victim agrees to pay a substantial sum of money. In many cases, victimized PC users ... (view more)

Fri
07
Dec
Dennis Faas's picture

Zeus Hackers Exploit Two-Factor Authentication

During the past twelve months, malicious software known as 'Eurograbber' was apparently used to steal $47 million in Europe alone. According to reports, the software took advantage of a popular security measure. The security researchers who ... discovered Eurograbber are now warning Internet users that the malware could easily spread from Europe to the rest of the world. (Source: checkpoint.com ) Eurograbber is a modified form of a previously known botnet called 'Zeus.' A botnet is a network of computers controlled by malicious software under the direction of a particular individual or gang of ... (view more)

Tue
04
Dec
Dennis Faas's picture

Security Essentials: Effectiveness Dropping Fast

Microsoft Security Essentials is a free antivirus software tool, which makes it a tempting download for many Internet users. However, a new report suggests it will protect computers only from two in every three or so worm, virus, or Trojan horse ... threats. An independent computer security lab based in Germany recently carried out tests of Security Essentials' effectiveness in detecting and removing security threats affecting Microsoft's popular Windows 7 operating system (OS). The lab is affiliated with AV-Test, an independent security institute that performs tests of security products every ... (view more)

Thu
29
Nov
Dennis Faas's picture

Lock Hacker Carries Out Texas Crime Spree

A string of hotel room thefts in Texas has brought into question the security of an estimated 10 million electronic door locks commonly used worldwide in hotels and other facilities. Back in July, a security researcher demonstrated a problem with a ... system known as Onity HT locks. He said the technology is used in one-third of hotels worldwide and covers more than half of all locks now in use. The researcher, Cody Brocious, says the main flaw in the system is the equipment used for two specific purposes: opening a door when the battery in the lock has failed and creating a master key card for ... (view more)

Thu
22
Nov
Dennis Faas's picture

New Windows Malware Exploits Google Docs

A new type of malware targeting Microsoft's new Windows 8 operating system (OS) reportedly uses Google Docs to carry out its attacks on unsuspecting users. According to a report from security firm Symantec (which discussed the issue in one of its ... recent Security Response blogs), a Trojan horse known as Backdoor.Makadocs is targeting Windows 8 users. Malware Disguises Itself; Tricks Users Here's how it works, according to Symantec: the malware exploits a vulnerability in the Google Docs program called "Viewer." Apparently the malware masks itself as a Rich Text Format (RTF) or Microsoft ... (view more)

Wed
21
Nov
Dennis Faas's picture

New Security Scheme Protects Data from Hackers

A new security technique could completely prevent hackers from intercepting data communications. The technique involves hiding an encryption key inside the same light that travels through standard fiber optic cables. The technique, known as quantum ... key distribution, uses a small amount of data as a key for decrypting much larger quantities of data. Quantum key distribution conveys the encryption key in the form of photons, the fundamental elements of visible light. Polarized photons can be used to indicate a 0 or a 1 -- standard computer binary code -- which is enough to carry any digital ... (view more)

Pages

Subscribe to RSS - Security