eweekdev

Zeus, SpyEye Trojans Back to Attacking Banks in Real Time

By: Robert Lemos Underground developers for the two major banking Trojans, Zeus and SpyEye, have honed their techniques for automated theft to the point that even two-factor authentication can be bypassed easily and automatically, according to a report released by Trend Micro this week. The evolution of the banking Trojans heralds tough times ahead for […]

LinkedIn Password Theft Underscores Cloud Security Dangers

By: Robert Lemos The leak of LinkedIn passwords has underscored that users of online services should choose unique and complex passwords for access to cloud services, according to an ongoing analysis. Ever since the June 6 discovery of the theft, security consulting firm KoreLogic has worked on analyzing the list of passwords taken from the […]

Google, Facebook, Twitter Join Alliance to Block ‘Malvertising,’ Web Fraud

By: Robert Lemos The StopBadware project teamed up with Google, Facebook, Twitter and other major Web content providers on Thursday to create an information-sharing group that aims to hinder attackers’ attempts to spread malware and sell fraudulent goods through online advertisements. The group, which is called the Ads Integrity Alliance and also includes AOL.com and […]

Flame Exploited Long-Known Flaw in MD5 Certificate Algorithm

By: Robert Lemos A known weakness in the MD5 hash function gave the group behind the Flame malware an opportunity to forge a valid certificate for Microsoft’s Windows Update service. Yet while security researchers have known about the weakness for more than a decade, nearly every company today continues to use the MD5 hash function […]

Flame Malware’s Forged Certificate Suggests Nation-State Effort

By: Robert Lemos A stealthy attack that spreads through the auto-update mechanism of an operating system or software has long been a nightmare scenario for security researchers. On June 7, an analysis of the targeted attack, known as Flame, found that the espionage program could do just that. Using a forged certificate for Microsoft’s Windows […]

Google Bouncer Vulnerabilities Probed by Security Researchers

By: Robert Lemos New details of security issues related to Google’s Bouncer, the company’s system for catching malicious applications before they are published in the Android marketplace, will be presented during a conference the weekend of June 9 by two researchers who used their own submissions to probe the service from the inside. The researchers, […]

As IPv6 Launches, It’s Time to Worry About Security

By: Robert Lemos Providers, large Web content providers and home router makers teamed together on Wednesday to launch their services on the next-generation Internet Protocol version 6, or IPv6. The effort, known as IPv6 World Launch Day, should change little for enterprise users and consumers, but IT groups at companies should take notice. Like any […]

Flame Communicated Through 85 Domains, Security Researchers Find

By: Robert Lemos The Flame malware, a sophisticated threat that appears to have targeted Iran and other Middle Eastern nations, is at least four years old, according to new research published June 4. After collaborating for a week on an analysis of Flame’s infrastructure, Russian security firm Kaspersky Labs and domain-name service provider OpenDNS reported […]

Smartphones, Tablets, Apps Streamline Customer Interactions

By: Samuel Greengard In the last few years, many organizations have grappled with the task of managing customer relationships effectively. As traditional communication channels, such as print, have morphed into a growing tangle of electronic offerings, the tools and methods required to connect with customers have undergone a fundamental change. Nowhere are the challenges more […]

F5 Networks ARX Platform Removes Chaos From Enterprise Storage

By: Frank Ohlhorst dnu Many IT professionals are wondering if the exponential growth of disk storage and the associated management chores will ever slow down. Regrettably, for those charged with the day-to-day administration of enterprise storage, the answer is likely no. Several factors are forcing the growth of storage pools, ranging from basic drivers, such […]