SECURITY EVANGELIST

Fight against online threats and cyber-crime continues.

This week we discover an increasing tendency in the present security landscape and that is the state control of large cybercriminal groups and their involvement in cyber espionage.

Our security blog published this week two important articles for your online security. The first blog post is an excellent source of free tools that you can use to protect your computer from cybercriminals and the second post deals with an issue we all need to clarify right now: Is Antivirus Dead? Or, are there other solutions that we need to employ to reach complete online protection?

Our goal is to bring you the latest security news from the digital world. And this is what we do.

These are the 10 security articles of the week that you should read in order to improve your online security.

 

Security articles of the week

 

 

1. WikiLeaks Publishes Archive of Documents Stolen in Sony Attack

Did you think you knew everything about the Sony Pictures security breach? Now, you can have access to more details, this time indexed and organized by WikiLeaks.

 

2. You Can Now ‘Google’ Your Lost Android Phone

Did you lose your phone? Now Google can help you find it. Just give it a try. Do we have to remind you that your mobile phone contains almost all your valuable and personal information?

 

3. Security Companies Hire Hackers, Ex-Spies to Fight Cyber Attacks

There is a market out there for the former spies, cyber-warriors and government-groomed hackers and the security companies are hiring! It is a job after all and every company wants to hire the best talents available.

 

4. Social engineering: You got nailed!

We prepare our systems for advanced malware designed by the most intelligent cybercriminal minds. But are we ready to deal with social engineering schemes that address our human side?

Social engineering is more significant than any new virus or backdoor you can imagine.

5. Russian Trolls’ Vast Library Of Insulting Images

Every content marketing creator knows how important it is to have images and visual graphics to support your claim. In this case, we have the Russian-language Internet trolls who use a website to collect the necessary images for their articles.

 

6. Botnet that enslaved 770,000 PCs worldwide comes crashing down

Simba, a botnet that enslaved more than 770,000 computers in 190 countries was taken down by law enforcement groups and private security companies.

Simda, as the botnet was known, infected an additional 128,000 new computers each month over the past half year, a testament to the stealth of the underlying backdoor trojan and the organization of its creators.

 

7. Nearly Half Of ‘Game of Thrones’ Upcoming Season Leaks Online — Was HBO Hacked?

Could this be the latest thing in the online world? Did they hack HBO? Is this the next Sony Pictures scandal? Is winter finally coming?

 

8. The Economics of Persistent Cyber Attacks

An interesting article that brings new insights and discloses unknown elements from the cybercriminal world that is supported by states like China and Russia.

Usually these nation-state groups have an arsenal of these capabilities and they have dedicated people who are constantly developing them.

 

9. Snowden Coming Closer To Icelandic Citizenship

Former Wikileaks spokesperson and current leader of the Icelandic Pirate Party Birgitta Jonsdottir pushes for citizenship for Edward Snowden, the famous whistleblower. It seems normal for a pirate to fight for another pirate.

 

10. New trend in cybercriminal activity: APT wars

Kaspersky Lab discovered that cybercriminal groups don’t just target economic or financial objectives, but sometimes they fight each other and check each other’s defences. Competition is everywhere these days.

 

We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in April 2015.

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP