CAMBRIDGE, Mass., Sept. 3, 2014 — Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company’s Prolexic Security Engineering & Research Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to launch distributed denial of service (DDoS) attacks against the entertainment industry and other verticals. The advisory is available for download from Prolexic (now part of Akamai) at www.prolexic.com/iptablex. (more…)
Security research Karsten Nohl of Berlin’s SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is “almost like a magic trick” because “you cannot tell where the virus came from.”
The US has charged a Russian man with being behind a major cybercrime operation that affected individuals and businesses worldwide.
Evgeniy Bogachev, said to be known as “lucky12345″ and “slavik”, is accused of being involved in attacks on more than a million computers. (more…)
What happens when a computer is infected with the malicious software, and what should you do to protect your files?
Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it? (more…)
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks is usually either to pay up or suck it up. This post offers a few pointers to help readers avoid becoming the next victim. (more…)
Smartphones are susceptible to malware and carriers have enabled NSA snooping, but the prevailing wisdom has it there’s still one part of your mobile phone that remains safe and un-hackable: your SIM card. (more…)
For years, Windows users have been plagued by ransomware demanding several hundred dollars to unlock their computers. (more…)
Just a week ago, the Flame virus, suspected to be a weapon in a heretofore undeclared cyberwar, was discovered by computer security experts. Now, unnamed U.S. government officials have told a New York Times reporter that the Stuxnet worm, another sophisticated piece of malware that was discovered in 2010, was the brainchild of secretive U.S. and Israeli intelligence agencies. Stuxnet, designed to deliver information about Iran’s uranium enrichment program and subsequently hamper it, was clearly a cyberwarfare tool. But previous discussions of its authorship were, at best, a series of educated guessesand unverified allegations. (more…)