Tag Archives: malware

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

One Congressman, One Tweet, Big Problems

Hacking social network sites is nothing new, yet political junkies have been Tweeting over an odd story about New York Congressman Anthony Weiner. It goes something like this: Over the weekend, Weiner’s Twitter account posted a photo addressed to a young … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

Should Anti-virus be Mandatory – South Korea Thinks So!

South Korea is now contemplating a new law that would require computer users to have anti-virus installed on their computers.  The law is called the “Zombie PC Prevention Bill.”  The South Korea law would 1.    Impose a statutory duty on … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , | Leave a comment

Cyber Security Risks for Online Users

Did you know that a report by Sophos in 2009 found that a malicious web site is detected about every 5 seconds? Since then, the pace has only increased.  Internet users must implement basic protections to stay safe while surfing … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

Smart Phone Malware Continues To Spread

While Android users may have previously felt secure, attacks against these devices continue to grow.  A new Android Trojan known as Geinimi  is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading

Posted in Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

CompTIA Ready’s an Upgrade to the Cyber Security Foundations Cert: Security+ SY0-301

If you’ve been putting off obtaining your Security+ certification and are not going to attempt the exam before December 31, 2010, you may want to wait until the new version of Security+ SY0-301 is released.  CompTIA is planning the new … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Stuxnet changes cyber security battlefield

While many things are unknown about Stuxnet, what is known is that it marks a critical change in cyber war.   So much so that Kaspersky labs describes it as “a prototype of a cyber-weapon that will lead to the creation … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment