The Internet Security threat report 2013 by semantic group has been released. Symantec “maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 51,644 recorded vulnerabilities (spanning more than two decades) from over 16,687 vendors representing over 43,391 products.” (Internet Security threat report 2013). “Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of approximately 69 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services and Norton™ consumer products, and other third-party data sources” (Internet Security threat report 2013). The report has got in-depth details about the growth of cyber attacks in the year 2012. The biggest area being the mobile malware , this will shock many because the main drive of this is too steal information and track movements.Whats the other new part, Zero-day vulnerabilities continue to trend upward; 14 were reported in 2012.Wait a munute! and you say that you are secure?
In February, a hacker placed a malicious program on shoe and clothing retailer Opening Ceremony’s website. For more than a month, the malware collected the names, addresses, and credit card information of customers who purchased items from the site.
“We discovered the malware on March 21, 2012, immediately removed it, and implemented increased security controls to prevent this from happening in the future,” Carol Lim, CEO and co-founder, wrote in a letter to customers in May. Continue reading How To Protect Your Commercial Web Server
Whether it is an exit interview upon termination or resignation, or just a simple question-and-answer session during an investigation, employee interviews are critical to handling insider incidents, IT forensics experts say.
“If you [don’t have] a procedure to formally interview people and to do it properly and record it, you’re not doing your job right,” says Steve Santorelli, director of global outreach at Internet security research group Team Cymru. Continue reading The Importance Of Interviews In Insider Investigations
April and May were significant months for malware growth and increased spam and phishing attacks, as the volume of known malware swelled by more than a factor of ten, growing by 927.4 percent from April to May, according to German email security provider Eleven’s E-Mail Security Report for June 2012. The volume of spam emails was also back on the rise, while virus outbreaks more than tripled, up by 251.6 percent, according to the report. Continue reading Massive growth of Malware and Spam in May
Google is warning Gmail users that the company believes that they may be targeted in state-sponsored attacks.
Though Google did not mention the Chinese government by name, China has been a frequent target of such allegations since Google blamed the country’s government for the Aurora attacks. Tuesday, Eric Grosse, Google’s vice president of security engineering, blogged that the company is constantly on the lookout for malicious activity on its systems, particularly attempts to illegally access user accounts. Continue reading Google to Warn Gmail Users of Possible State-Sponsored Cyber-Attacks
Internet Protocol version 6 (IPv6) – a replacement to the existing IPv4 system – launched at 00:01 GMT on Wednesday.
The new system is necessary to prevent the internet running out of available addresses for new devices.
Experts said users should not notice any difference in their web use, and new devices should being using the new system as standard.
IPv4, which was conceived during the early days of the internet, only allows just over four billion unique IP addresses, the sequences of numbers used to identify a device. Continue reading Protocol version 6 (IPv6) launched
The Flame malware, a sophisticated threat that appears to have targeted Iran and other Middle Eastern nations, is at least four years old, according to new research published June 4.
After collaborating for a week on an analysis of Flame’s infrastructure, Russian security firm Kaspersky Labs and domain-name service provider OpenDNS reported that they had discovered at least 85 domains registered over the last four years that were used to host the command-and-control servers associated with Flame. The first three domains were registered March 2, 2008, according to OpenDNS. Continue reading Flame Communicated Through 85 Domains