Thursday, October 24, 2013

Trojan - extortionist learned to infect users through the Google search

ESET announced a new method of distribution of Trojan Nymaim, which can block the user's computer in order to demand money for decrypted files.

Since the end of September 2013 has attracted the attention of experts already known malware Nymaim - Trojan with the functions of the blackmailer. Earlier this software infection carried by a known set of attackers exploit - BlackHole, which are used on the computer are vulnerable application or operating system to deliver malicious code. However, recently it was reported that the author of BlackHole kit was detained in Russia. It seems that in this context, hackers have begun using a new way to infect users .

Since the end of September, it was recorded a large number of detections of this malware downloaded using the file browser. The experts found that referral links that lead to the download of malicious files that belong to Google. This means that before infecting the user has entered in a Google-search query and clicks on one of the links in the search results.

According to the survey web pages that initiated the download of malicious code for large-scale contamination attackers used a so-called "Dark search engine optimization" (Black Hat SEO), which is promoted by a specially crafted malicious page in the top issue on popular keywords.

Wednesday, October 23, 2013

Average annual damage from cyber attacks increased by 78 %

The frequency of attacks, the level of their damage and the time to correct them continue to grow the fourth consecutive year, according to the latest report from Ponemon Institute.

In a report in 2013 Cost of Cyber ​​Crime Study estimated that the average annual damage from cyber attacks today is 11.56 million U.S. dollars, an increase of 78 % over four years ago when they released their first report in this series. In addition, over the same four years, the average time required to eliminate the effects of cyber attacks has increased by 130%, and the average cost of removing a single attack amounted to more than U.S. $ 1 million .

Over the past few years, cyber attacks have become much more sophisticated and dangerous. Many hackers around the world joined together in a well-organized and generously sponsored kiberpodpole, whose members actively share their experiences and " best practices." According to the report, an advanced analytics in the security and networking technologies (eg , systems SIEM), including on the basis of big data, help to greatly reduce the threat and the level of spending on the fight against cybercrime.

Tuesday, October 22, 2013

Young people contravene corporate policies governing use of own devices

The study, conducted by Vision Critical, at the request of Fortinet, shows that 51% of employees aged 21 to 32 years rather break the rules of use of personal mobile devices in the office than give up smartphones, digital clocks or tablets.

According to the study, 36% of the 3,200 young employees of companies willing to break corporate security policies for the use of cloud storage, like Dropbox, for work purposes. As for wearable computing solutions, such as Google Glass and clever hours, 48 % are willing to break the rules of safety.

16% of respondents believe that these technologies will soon become widespread in the corporate sector. 33 % believe that once these computing devices become more affordable, they will immediately begin to use for the job. On the other hand, only 8% say these technologies have not become popular.

Friday, October 18, 2013

Kaspersky Lab releases an updated version of Kaspersky Security 8.0 for SharePoint Server

Kaspersky Lab today released an updated version of Kaspersky Security 8.0 for SharePoint Server, which in addition to a number of functional enhancements supports Microsoft SharePoint Server 2013 and improved protection against cyber threats.

Enterprise collaboration solutions greatly simplify the process of solving the daily challenges faced by employees of the companies. However, the documents stored in these systems are being infected with malware, can cause an epidemic throughout the corporate network - which is why these files require special protection . To solve this problem, Kaspersky Lab offers Kaspersky Security 8.0 for SharePoint Server - enterprise solution designed specifically for the protection of IT- infrastructure for joint work in the company.

As part of a renovation solution was integrated support for Microsoft SharePoint Server 2013 , and also added anti-phishing technologies Kaspersky Lab. Now any information contained on the website link to an external source will be checked for legitimacy and locked, if it turns phishing.

Thursday, October 17, 2013

Hackers broke into the service of the distribution of press releases PR Newswire

American IT journalist and specialist in IT investigations Brian Krebs on his blog CrebsOnSecurity writes that the world's largest service for distributing press releases PRNewswire been hacked in March 2013, but this is not the service itself, and then said it had been jailbroken nothing was not known. Furthermore, Krebs reported that data on breaking PR Newswire stored on the same server under the control of hackers, as the original product codes Adobe Systems, which hackers also gained access to a burglary Adobe.

This arrangement indicates that for the first and for the second operation are the same people. Krebs said he contacted the PR Newswire, outlining them with your data. Operator service acknowledged the hacking and assured IT journalist is that today begins sending alerts to customers about the need to change passwords. However, Krebs notes that after more than 8 months after the break-in this very practical anymore.

Tuesday, October 15, 2013

Edward Snowden declassified another NSA surveillance program

NSA collects millions of online address books of users per year.

U.S. National Security Agency collects millions of contact lists of e-mail services , and instant messaging platforms people in America and around the world. It on Tuesday, October 15, reported the publication of The Washington Post with reference to another portion of the documents submitted by the former U.S. intelligence officer Edward Snowden.

Tracking program, which has not been previously disclosed, is the interception of e-mail addresses and "buddy lists" in the instant messaging service during transmission on global communication channels. Data collection began at the moment when a user authenticate to the instant messaging service or public e-mail, or synchronize their devices with the information stored on remote servers.

Instead of tracking specific users, the NSA collects data en masse in order to make it easier for users to define relationships with terrorist organizations.

Monday, October 14, 2013

A serious Vulnerability Found In D-Link Routers

The hacker group, which specializes in embedded electronics, has found a vulnerability in the popular home routers D-Link, with help which to the management unit may be allowed an unauthorized user.

The vulnerability, which opens access to the administrator's Web interface allows you to monitor a number of custom functions in the popular routers DIR-100, DI- 524, DI-524UP, DI-604S, DI-604UP, DI-604 and TM-G5240. According to the resource / dev/ttys0, several lineup Planex routers are vulnerable, since they use the same system firmware.

The report said that in order to gain access to the management of the router without a password the user needs to open the login screen and enter a user name in the column sequence xmlset_roodkcableoj28840ybtide.

Thursday, October 10, 2013

Adobe has released two security bulletins

New patches fix vulnerabilities CVE-2013-5327 and CVE-2013-5325.

The company Adobe, last week became the victim of a powerful cyber attacks, which resulted in compromised data of millions of its customers, has released two security bulletins that address new vulnerabilities that are not related to the incident.

The first update affects RoboHelp 10 for Windows and fixes a memory corruption vulnerability CVE-2013-5327, which allows an attacker to execute malicious code on the target system. The second update is for Adobe Reader and Acrobat XI (11.0.04) for Windows and fixes a regression introduced in version 11.0.04 and affecting the security controls in Javascript. Vulnerability CVE- 2013-5325 lets you run URI scheme Javacript when viewing of PDF-documents in the browser.