weekly-security-roundupFight against online threats and cyber-crime continues. This week brought a few articles that indicate cyber threats can be used not only in the cybercriminal world to retrieve confidential data from the private sector, but also by foreign governments against its own citizens. Our security blog provided this week 3 important security articles for your protection. The first article underlines a few valuable conclusions from our past experience with Zeus Gameover and CryptoLocker. The second article operates a complete analysis of Dyreza, one of the latest and most dangerous pieces of malware out there. And the third article takes on one of most troublesome reports on the nature of cyber war and its connections between a state and an organized group of cybercriminals. Our goal is to bring you the latest security news from the digital world. And this is what we do. These are the 10 security articles of the week that you should read in order to improve your online security.  

Security articles of the week


1. Cryptolocker variant Torrentlocker making new victims in NL

Who’s afraid of CryptoLocker? Well, we should all be afraid, especially when this infamous ransomware comes with a nasty variant, known as Torrentlocker. This article tells us all about it and how we can stay safe.

2. WireLurker Apple iDevice Malware Attacks More Than 350,000 In China – Was It The Government Again?

A new piece of malware is in town! And this time, it affects Apple iPhones and iPads platforms. Is this threat connected to the Chinese government and should we be worried?

3. Overcoming Big Data security obstacles

How are big organizations keeping their data safe? To quote the author of the article :”It must always be remembered that security is a process, not a product.” Therefore, security breaches should be contained by using a set of processes and adequate policies.

4. Facebook Users Still Being Suckered by Common Scams, Says Bitdefender

Can you tell you are a victim of scam on Facebook? The whitepaper from Bitdefender, presented by the article above, says we can’t tell. What do you think?

5. Hacking Up History

This article gives us a short historical overview of hacking and the main events that marked its infamous evolution.

6. How the Internet Affects National Sovereignty

Bruce Schneider brings into attention an important paper by Melissa E. Hathaway, on how Internet evolution increases not only our vulnerability, but how economic and political interests are at stake in the inter-connected world.

7. From Malware To Breach

Got malware? Well, don’t worry, apparently it won’t steal your money, you will just send you a lot of spam and spyware. It will be annoying, but you don’t need to panic. This is what this article says. Read more and decide for yourself.

8. Did China Order Hackers to Cripple the Hong Kong Protest?

Has the Chinese authorities employed hacking methods and malicious software against the Hong Kong protesters? What type of software did they use and to what purpose? The article above comes with more details.

9. Informational Wi-Fi traffic can be used as covert communication channel for malware

Is your wireless network really secured? A security researcher brings on a tool to demonstrate how the unauthenticated data packets in wireless LAN protocols can be used to control malware on an infected computer.

10. FBI grabs a Most Wanted Cyber Fugitive

He has stolen over 40,000 online identities and millions of dollars, but now they got him. Read all about the FBI operation that led to the arrest of John Gordon Baden, one of the world’s most wanted cybercriminals.   We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in November 2014.

Leave a Reply

Your email address will not be published. Required fields are marked *