What is WhatsApp, and how popular is it ?
Sunday, February 23rd, 2014 | Author:

Yesterday evening, Facebook dropped the bomb: the social network giant will buy WhatsApp, a messaging service, for a total of $19 billion, including $16 billion in cash and stock, and $3 billion in restricted stock units for WhatsApp’s employees.

Several readers commented on our post on the acquisition along the lines of “I never heard of WhatsApp” or “What’s so special about it?” We’re explaining in this post.

 

 

 

 

READ MORE …

Category: Business  | Leave a Comment
Keep Learning Linux—It’s The Future
Sunday, February 23rd, 2014 | Author:

Everyone’s a tech company these days. From new-school video streaming services like Netflix to old-school grocery businesses and government agencies, technology increasingly drives business productivity. At the heart of this movement is Linux, resulting in exceptional, highly paid job opportunities for Linux professionals.

READ MORE …

Category: IT Security  | Leave a Comment

Recently-released attack code exploiting a critical Android vulnerability gives attackers a point-and-click interface for hacking a majority of smartphones and tablets that run the Google operating system, its creators said.

The attack was published last week as a module to the open-source Metasploit exploit framework used by security professionals and hackers alike. The code exploits a critical bug in Android’s WebView programming interface that was disclosed 14 months ago. The security hole typically gives attackers remote access to a phone’s camera and file system and in some cases also exposes other resources, such as geographic location data, SD card contents, and address books. Google patched the vulnerability in November with the release of Android 4.2, but according to the company’s figures, the fix is installed on well under half of the handsets it tracks.

 

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment

Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 best-selling SOHO wireless router models have security vulnerabilities.

READ MORE …

Category: IT Security  | Leave a Comment

Today’s malware uses ingenious techniques to evade detection by traditional signature-based antimalware. Intrusion prevention systems, Web filtering and antivirus products are simply no longer sufficient for defending against a new breed of attacker that combines sophisticated malware with persistent remote access, with the aim of stealing sensitive corporate data over an extended period of time.

New threat-detection tools that offer advanced malware detection through sandboxing technology aim to counter this problem. These products are offered by various companies, including FireEye Inc, Damballa Inc, Palo Alto Networks, NetWitness and others. All of these systems promise near-complete protection from the malware threat. In this tip, we’ll discuss the emerging techniques employed by today’s advanced malware and threat-detection products, focusing on the advantages they offer and the challenges that they have yet to solve.

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment

OLLEGE PARK, Md. – Hackers, breaching the University of Maryland’s personnel information database security, obtained social security numbers dating back to 1998, according to a message from university President Wallace Loh.

“I am truly sorry. Computer and data security are a very high priority of our University,” Loh said in the letter posted online.

The database contained 309,079 records of faculty, staff, students and affiliated personnel from the College Park and Shady Grove campuses who have been issued a university ID since 1998, the letter states. The information contained within the record include social security numbers, date of birth and college ID.

 

 

 

READ MORE …

Singapore is on high alert after over 100 local web sites were defaced, including several run by the opposition Reform Party.

A total of 103 sites were hit in an attack on Monday launched from an Indonesian IP address, according to Zone-H, an archive of defaced web sites (h/t TechInAsia).

The majority are now either offline or defaced with the message “Hacked By Mr. AzRooT” and a link to the Twitter profile of user @4zrai, who boasts of other scalps this month including the Italian and Mali governments and Indonesian military.

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment

Network World – McAfee says it’s developing a product it calls “Threat Intelligence Exchange,” which it expects to introduce by mid-year as a core means to garner information about cyber-attacks and response for the enterprise.

Threat Intelligence Exchange is described as a “messaging framework” that would initially collect information about Windows-based endpoints in the enterprise and whether they had been compromised, identify patterns and allow for a rapid “immunization” of assets. According to Bradon Rogers, McAfee senior vice president of product solutions and marketing, it will include a client add-on agent for McAfee’s anti-malware software that could be deployed via McAfee ePolicy Orchestrator management console. There will also be a server-based Threat Intelligence Exchange component that will work as a VMware-based virtual-machine that could reside in the organization’s data center to centrally collect the wide variety of contextual information related to threats.

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment
Why security pros should care about Bitcoin’s troubles
Friday, February 21st, 2014 | Author:

CSO – Chief security officers who believe the latest Bitcoin problems do not affect them should think again. Securing such digital currency flowing through peer-to-peer payment systems may one day be the responsibility of security pros.

The world of Bitcoin has certainly had a bad week. A bug in its protocol forced two exchanges, Mt. Gox and BitStamp, to halt trading temporarily. The flaw was also blamed for the theft of $2.6 million from the Bitcoin wallet belonging to Silk Road 2, the online black market that took the place of the original Silk Road after it was shutdown by federal authorities. Both anonymous marketplaces provide a place on the dark web to sell and buy illegal drugs.

While the latest events may seem unimportant to security pros, they should not be ignored, because they represent the maturing process of a payment system that corporations may one day be asking CSOs to secure.

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment

As everyone knows, lone actors such as active shooters and bombers target public places like schools, malls and movie theaters and public events like speaking engagements. In many cases, threats of violence posted to social media precede these attacks.

With this in mind, CSOs and CISOs should consider complementing security measures with social media monitoring and response efforts designed to address the potential that lone actors will carry out threats of violence against the enterprise or any of its employees.

 

 

 

READ MORE …

Category: IT Security  | Leave a Comment