Fahmida Y. Rashid

Attackers Breached Foxconn, Dumped Data For Fun

A group of hackers appear to have breached and extracted information from Foxconn’s network. Foxconn Electronics has not confirmed the breach. Attackers breached Foxconn Electronics, a Shenzen, China-based company responsible for manufacturing Apple’s iPhone, and extracted data from the servers, according to a Feb. 8 post on text-sharing site Pastebin. @SwaggSec claimed responsibility for the […]

Facebook Still Not Deleting Photos From CDN: Ars Technica

Almost three years after Facebook promised to look into why photos deleted by users were still accessible online, the photos are still available, reported Ars Technica. Facebook offers the option to delete photos, but it appears the images are removed only from the site and not from the content delivery networks it uses to speed […]

Adobe Flash Player Protected Mode Beta Released for Firefox

Two of the three major Web browsers now offer some form of Flash Player with built-in sandbox protection. Internet Explorer is not one of them. Adobe has been modifying its popular Flash Player to include the sandbox technology that would block malicious code before executing. Adobe on Feb. 6 released a beta version of the […]

Symantec pcAnywhere Code Leaked After $50,000 Payoff Deal Collapses

Symantec offered $50,000 to Yamatough in exchange for returning the source code related to the company€™s pcAnywhere product, according to an email chain posted on Pastebin. When negotiations fell apart, a copy of the code was leaked and posted on Pirate Bay. According to the emails posted Feb.6, Sam Thomas, a Symantec employee, reached out […]

Google, Microsoft Survival Conflicts With Internet Data Privacy

Privacy should be built into online services by default, but it won’t happen so long as companies, such as Microsoft, Google and Facebook, rely on advertising to make money, according to a prominent privacy activist. Major technology vendors are providing sophisticated applications in exchange for user data, such as their preferences, online activities and behavior, […]

Cyber-Legislation Bill Approved by House, Senate Prepares Its Own

Federal law enforcement officials expect cyber-espionage, hacktivists and cyber-attacks to soon surpass traditional terrorism as the No. 1 threat facing the United States, according to Congressional testimony. “Stopping terrorists is the No. 1 priority,” Robert Mueller, director of the Federal Bureau of Investigation told the Senate Select Committee on Intelligence Feb. 1. “But down the […]

State of SCADA Security Worries Researchers

CANCUN, Mexico €” Recent reports painted a bleak picture of the security issues plaguing industrial control systems, but the situation is exacerbated by the fact that administrators are naïve about the dangers, researcher said. Researchers presented some alarming findings about the state of security for supervisory control and data acquisition systems at the Kaspersky Security […]

FBI Prepares to Shut Down DNSChanger Temporary Servers, Infections Remain

Some of the major organizations still have not removed the DNSChanger Trojan from infected computers, despite the fact that the botnet’s command-and-control infrastructure has been under the Federal Bureau of Investigation’s control for the past few months. The primary function of the DNSChanger malware family is to replace the Domain Name System servers defined on […]

Apache, Apple, PHP Release Security Updates

The past few days has been filled with security patches and updates that may have slipped past IT administrators. Apache released its HTTP Server 2.2.22 which included fixes to six significant security flaws. Most of the vulnerabilities were rated either moderate or low. Apache fixed two low-priority privilege escalation issues, three moderate-priority exposure flaws, and […]

VeriSign Breach Not A Surprise, Attackers Target Everyone

Companies get breached. That’s the lesson of 2011. Large or small, no organization is immune to attacks. The VeriSign breach was just another day of business as usual for the bad guys. Campaigns such as Operation Shady Rat, disclosed by McAfee, and Nitro, disclosed by Symantec, showed how every major industry vertical has been compromised […]