Tagged: Networking

Coming from out of nowhere the ‘Regin’ malware impact is described as groundbreaking.

 Malware

Experts don’t know where it came from, and aren’t quite sure what it does.

But they do know this: a newly-uncovered cybersecurity threat appears to have been designed by a government, and is “groundbreaking and almost peerless.”

(more…)

Trend Micro predicts Targeted Attacks on the Rise worldwide

Hacking
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
(more…)

Shellshock botnet targets Akamai, as well as US DoD networks.

Norse-Realtime-Attacks
Attackers were quick to capitalized on the  Shellshock Bash command interpreter bug disclosed yesterday.  Constructing a botnet that is rapidly try to infect other servers, according to a security researcher. (more…)

Akamai Warns of IptabLes and IptabLex Infection on Linux, DDoS attacks

AKAMAI TECHNOLOGIES LOGO
CAMBRIDGE, Mass.
, Sept. 3, 2014 — Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company’s Prolexic Security Engineering & Research Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to launch distributed denial of service (DDoS) attacks against the entertainment industry and other verticals.  The advisory is available for download from Prolexic (now part of Akamai) at www.prolexic.com/iptablex.   (more…)

Malware communicates at a distance of 65 feet using built-in mics and speakers.

 

Malware
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
(more…)

Infinite-capacity wireless vortex beams carry 2.5 terabits per second

spiral-light-348x196
American and Israeli researchers have used twisted, vortex beams to transmit data at 2.5 terabits per second. As far as we can discern, this is the fastest wireless network ever created — by some margin. This technique is likely to be used in the next few years to vastly increase the throughput of both wireless and fiber-optic networks.
(more…)