By: Robert Lemos Underground developers for the two major banking Trojans, Zeus and SpyEye, have honed their techniques for automated theft to the point that even two-factor authentication can be bypassed easily and automatically, according to a report released by Trend Micro this week. The evolution of the banking Trojans heralds tough times ahead for […]
By: Robert Lemos The leak of LinkedIn passwords has underscored that users of online services should choose unique and complex passwords for access to cloud services, according to an ongoing analysis. Ever since the June 6 discovery of the theft, security consulting firm KoreLogic has worked on analyzing the list of passwords taken from the […]
By: Robert Lemos The StopBadware project teamed up with Google, Facebook, Twitter and other major Web content providers on Thursday to create an information-sharing group that aims to hinder attackers’ attempts to spread malware and sell fraudulent goods through online advertisements. The group, which is called the Ads Integrity Alliance and also includes AOL.com and […]
By: Robert Lemos A known weakness in the MD5 hash function gave the group behind the Flame malware an opportunity to forge a valid certificate for Microsoft’s Windows Update service. Yet while security researchers have known about the weakness for more than a decade, nearly every company today continues to use the MD5 hash function […]
By: Robert Lemos A stealthy attack that spreads through the auto-update mechanism of an operating system or software has long been a nightmare scenario for security researchers. On June 7, an analysis of the targeted attack, known as Flame, found that the espionage program could do just that. Using a forged certificate for Microsoft’s Windows […]
By: Robert Lemos New details of security issues related to Google’s Bouncer, the company’s system for catching malicious applications before they are published in the Android marketplace, will be presented during a conference the weekend of June 9 by two researchers who used their own submissions to probe the service from the inside. The researchers, […]
By: Robert Lemos Providers, large Web content providers and home router makers teamed together on Wednesday to launch their services on the next-generation Internet Protocol version 6, or IPv6. The effort, known as IPv6 World Launch Day, should change little for enterprise users and consumers, but IT groups at companies should take notice. Like any […]
By: Robert Lemos The Flame malware, a sophisticated threat that appears to have targeted Iran and other Middle Eastern nations, is at least four years old, according to new research published June 4. After collaborating for a week on an analysis of Flame’s infrastructure, Russian security firm Kaspersky Labs and domain-name service provider OpenDNS reported […]
By: Samuel Greengard In the last few years, many organizations have grappled with the task of managing customer relationships effectively. As traditional communication channels, such as print, have morphed into a growing tangle of electronic offerings, the tools and methods required to connect with customers have undergone a fundamental change. Nowhere are the challenges more […]
By: Frank Ohlhorst dnu Many IT professionals are wondering if the exponential growth of disk storage and the associated management chores will ever slow down. Regrettably, for those charged with the day-to-day administration of enterprise storage, the answer is likely no. Several factors are forcing the growth of storage pools, ranging from basic drivers, such […]