Fahmida Y. Rashid

Cyber-Attackers Deface Steam Gaming Forums, Access Credit Card Database

In a two-pronged attack, cyber-attackers have broken into a database belonging to the Steam videogame service that contained credit card information for an unknown number of users. After unknown perpetrators defaced the Steam discussion forums a little over a week ago, investigators discovered the same attackers had accessed at least one database belonging to the […]

Stupid Computer Security Myths, ‘Dumb Ideas’ Keep Enterprises at Risk

Despite a growing awareness of security threats and basic security measures necessary to secure networks and data, many misconceptions and myths keep computer users and enterprises at risk, a security consultant said at a Kaspersky Lab event in New York City. While organizations are deploying firewalls, public key cryptography and complying with various security and […]

IBM Mobile Management Service Helps IT Secure Personal Devices

IBM announced a new managed service to help IT administrators manage and support all the personal mobile devices being used by employees. With IBM’s Hosted Mobile Device Security Management service, IT departments can ensure personal phones and tablets comply with corporate security policies, protect them from malware infections, track user activity and secure connections to […]

RSA Adds SecurID Two-Factor Authentication to Microsoft Azure Cloud

Organizations can now use their SecurID two-factor authentication deployments to secure cloud applications running on Microsoft Windows Active Directory Federation Services (ADFS), RSA Security said.Users will be able to add multi-factor authentication into Office 365 applications, including Microsoft Exchange and Microsoft Azure, and still use Active Directory roles to control authentication for both on-premise applications […]

Apple Fixes Battery, Kernel Issues in iOS 5.0.1 Update

Earlier this week, a security researcher well-known for hacking Apple products said he’d found a kernel bug that let him run unsigned code on iOS devices, bypassing Apple’s protections. Within 72 hours, Apple has fixed that flaw. Apple released an update to iOS 5 on Nov. 10 for the iPhone, iPod Touch, and iPad to […]

More CAs Report Breaches, Suspend Issuing SSL Certificates

Two more certificate authorities have recently uncovered breaches in their networks and suspended issuing new digital certificates, prompting new concerns about trusting the CA system and the danger of relying on a system riddled with so many problems. The largest CA in Netherlands, KPN/Getronics, suspended its certificates business after discovering a distributed denial-of-service tool on […]

Proposed Facebook Privacy Complaint Settlement Under FTC Review

Under a proposed 20-year settlement, Facebook would be required to obtain express consent from users before sharing material that was posted under earlier terms, The Wall Street Journal reported. The U.S. Federal Trade Commission has proposed a 20-year settlement with Facebook over charges that the social networking giant changed default user settings that resulted in […]

Cyber-Criminals Intercept Banking Credentials for Fast Wire Transfer Fraud

Cyber-criminals are increasingly attacking banks and other financial institutions to transfer funds fraudulently into accounts under their control. There are a number of ways for attackers to gain control, and malware is just one of them, according to Jorge Solis, a senior vice president of security at First Midwest Bank in Itasca, Ill.First Midwest Bank […]

FBI Busts Massive Click-Fraud Cyber-Ring That Netted $14 Million

The FBI and its international partners have charged six individuals with conducting a sophisticated click-fraud scheme that netted them millions of dollars, the federal agency said. The cyber-ring infected about 4 million computers in 100 countries with malware and pocketed at least $14 million by manipulating online advertisements, the FBI said Nov. 9. Six Estonian […]

IT Needs to Think About Security When Considering Hadoop

NEW YORK-Organizations planning to use Hadoop to aggregate and analyze data from multiple sources need to consider potential security issues beforehand, according to IT professionals at the Hadoop World conference here. Hadoop makes it easier for organizations to get a handle on the large volumes of data being generated each day, but can also create […]