Weekly Security Roundup #4: New Malware Threats Emerge
Fight against online threats and cyber-crime continues. This week brought a few articles that indicate cyber threats can be used not only in the cybercriminal world to retrieve confidential data from the private sector, but also by foreign governments against its own citizens. Our security blog provided this week 3 important security articles for your protection. The first article underlines a few valuable conclusions from our past experience with Zeus Gameover and CryptoLocker. The second article operates a complete analysis of Dyreza, one of the latest and most dangerous pieces of malware out there. And the third article takes on one of most troublesome reports on the nature of cyber war and its connections between a state and an organized group of cybercriminals. Our goal is to bring you the latest security news from the digital world. And this is what we do. These are the 10 security articles of the week that you should read in order to improve your online security.
Security articles of the week
Who’s afraid of CryptoLocker? Well, we should all be afraid, especially when this infamous ransomware comes with a nasty variant, known as Torrentlocker. This article tells us all about it and how we can stay safe.
2. WireLurker Apple iDevice Malware Attacks More Than 350,000 In China – Was It The Government Again?
A new piece of malware is in town! And this time, it affects Apple iPhones and iPads platforms. Is this threat connected to the Chinese government and should we be worried?
How are big organizations keeping their data safe? To quote the author of the article :”It must always be remembered that security is a process, not a product.” Therefore, security breaches should be contained by using a set of processes and adequate policies.
Can you tell you are a victim of scam on Facebook? The whitepaper from Bitdefender, presented by the article above, says we can’t tell. What do you think?
This article gives us a short historical overview of hacking and the main events that marked its infamous evolution.
Bruce Schneider brings into attention an important paper by Melissa E. Hathaway, on how Internet evolution increases not only our vulnerability, but how economic and political interests are at stake in the inter-connected world.
Got malware? Well, don’t worry, apparently it won’t steal your money, you will just send you a lot of spam and spyware. It will be annoying, but you don’t need to panic. This is what this article says. Read more and decide for yourself.
Has the Chinese authorities employed hacking methods and malicious software against the Hong Kong protesters? What type of software did they use and to what purpose? The article above comes with more details.
Is your wireless network really secured? A security researcher brings on a tool to demonstrate how the unauthenticated data packets in wireless LAN protocols can be used to control malware on an infected computer.
He has stolen over 40,000 online identities and millions of dollars, but now they got him. Read all about the FBI operation that led to the arrest of John Gordon Baden, one of the world’s most wanted cybercriminals. We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?