Wednesday, March 5, 2014
Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” – a bogus version of Netflix which sends password and credit card information to Russia, according to app security specialist Marble Security.
David Jevans, CTO and founder of the company said that he was alerted to the problem by a company testing his product, software to help organizations manage mobile devices, after it repeatedly flagged Netflix as malicious, according to PC World’s report.
Jevans’ team analysed the app, and found that it was bogus, using tools including one that analyzed the app’s network traffic for signs of communication with known malicious servers. Jevans says, “This isn’t the real Netflix. You’ve got one that has been tampered with, and is sending passwords and credit card information to Russia.”
Jevans says that the customer informed him that the app had arrived pre-installed, according to Info World’s report. The company then investigated devices from other customers, and found the same malicious app installed on smartphones and tablets from four manufacturers.
“We suspect for most of them, it is preinstalled,” Jevans said.
Sunday, March 2, 2014
Note: Is Cyber TSCM part of your organizations Cybersecurity program? No? Never heard of Cyber TSCM? Then you already have a gaping hole in your organizations risk management program. Contact us we can help ~JDL
Cybersecurity concerns with our critical infrastructures are well known. In recent years, the
Department of Homeland Security (DHS) and other authorities have encouraged critical infrastructure owners and operators to take steps to ensure cybersecurity for both their business and critical control system assets.
American Petroleum Institute (API) was ahead of the game when, in October 2004, it issued API 1164, a voluntary industry standard specific to supervisory control and data acquisition (SCADA) systems designed to improve security within the oil and gas pipeline industry.
Most pipeline utilities have a security program implemented already, but in the changing landscape of attack threats and methodologies, the key question remains: Are current efforts enough? Cybersecurity risks to control systems range from pervasive malware designed by organized crime syndicates to insider threats and sophisticated, targeted attacks.
Information technology (IT) security teams are focused on preventing information theft: credit card numbers, contract details and intellectual property, for example.
Saturday, March 1, 2014
From large corporations to small businesses, everybody is spying on their competitors in the digital realm. Everything from social media to email marketing and online advertising is being scrutinized. Not only does it provide insight into how competitors are promoting their business but also offers up ideas on untapped opportunities a business can implement.
If you are looking to get the scoop on your competitors, put your spy glasses on and keep reading.
Determine your most important online competitors. The best way to look for your competitors is to perform a Google search for your main keywords. Let’s examine the baby niche market.
A search for the keyword “baby” reveals the following results:
Friday, February 14, 2014
Friday, February 7, 2014
The US blamed Russia for a leak of a phone call involving a US assistant secretary of state, while a top Kremlin official said Russia had video of Sochi reporters' hotel bathrooms.
An intercepted telephone call in which the top American official in Europe essentially tells theEuropean Union to “stuff it” on Ukraine – but in far less diplomatic terms – is certainly damaging for its content.
But the source behind the interception could become the more pressing story, as the Olympic Games inSochi kick off today: The US is blaming it on Russia.
The telephone call from last month, between US Assistant Secretary of State Victoria Nuland and US Ambassador to Ukraine Geoffrey Pyatt, was first covered in the media by the Kyiv Post, and captures exasperation on the part of Ms. Nuland at the way the EU had, to date, sought to end the increasingly violent standoff.