IDG News Service – The security industry expects the number of cyber-espionage attacks to increase in 2012 and the malware used for this purpose to become increasingly sophisticated.
In the past two years there has been a surge in the number of malware-based attacks that resulted in sensitive data being stolen from government agencies, defense contractors, Fortune 500 companies, human rights organizations and other institutions.
“I absolutely expect this trend to continue through 2012 and beyond,” said Rik Ferguson, director of security research and communication at security firm Trend Micro. “Espionage activities have, for hundreds of years, taken advantage of cutting-edge technologies to carry out covert operations; 2011 was not the beginning of Internet-facilitated espionage, nor will it be the end,” he added. Continue reading Expect more cyber-espionage, sophisticated malware in 2012, experts say
Johns Hopkins professors propose a calendar in which each date falls on the same day of the week as it did the year before.
(CNN) — Imagine a future in which you always know the date of baseball’s opening day. Or that your birthday is always on a Tuesday (sorry). Or that New Year’s Eve is always on a Saturday.
As the people of the world prepare to hang their 2012 calendars, two professors at Johns Hopkins University are proposing one you can keep forever, as each date falls on the same day of the week as it did the year before.
Christmas might always be celebrated on a Sunday, for instance, and Memorial Day Monday could always be on May 28. Continue reading Professors’ proposed calendar synchronizes dates with days
Windows 8 will let you log in by using a photo as your password.(Credit: Microsoft) Continue reading Windows 8 to let you use a picture as your password
2011 Year in Review: Seven Prime Hacks and Why They are Significant
There was never a dull moment in 2011. Security was front-page news in major mainstream publications. Commercial hackers were running rampant, compromising millions of Web sites while spam bots were taken offline. Cyber-espionage moved from a government-only term to a growing concern among corporations, and certain countries felt the outstretched hands of Big Brother reach the cyber-world. With all these hacks, is it even possible to choose the seven prime hacks of 2011? It’s not an easy task, but let’s take a crack at it. Continue reading Seven Significant Hacks of 2011
Microsoft, beginning in January, will automatically upgrade Windows customers to the latest version of IE available for their PC, Ryan Gavin, senior director of IE, said in a blog post Thursday. The Redmond, Wash.-based computing giant’s move to embrace what is known as “silent updates” follows actions already taken by Google, which pioneered the concept for its Chrome web browser in 2009, and Mozilla, which announced recently it is working on a mechanism for automatic Firefox updates.
Microsoft is aiming to better protect users from threats, such as social-engineered malware, which often targets out-of-date web browsers, Gavin said. Continue reading Microsoft to begin silently updating IE in 2012
According to an “unnamed” security analyst, the vast majority of computer system intrusions perpetrated by Chinese Cyber-Agents are the work of just 12 separate groups or entities. There are suspicions and evidence, that China has been active in the arena of offensive computer espionagefor years.
In addition, there is the Chinese Cyber Army, a conglomeration of several Chinese hacktivist groups that act in the interest, and with guidance from, the Chinese Peoples Army and/or the Chinese state apparatus.
China also officially and publicly this year announced the formation of a specialized cadre of cyberwar experts, although whether this was meant as a decoy from the fact that they already possess such forces, or to further enhance their capabilities is difficult to establish.
At the same time, Iran, Pakistan, and Russia all seem to have developed cyberwar strategies as well, and are actively engaging in executing these. Continue reading We have an Entire Commercial Class of Security Professionals, but Few Hackers. Where are our Cyber Warriors?