Tuesday, January 29, 2013
Thursday, January 24, 2013
Healthcare is entering a fight against an opponent that is already armed with advanced tools and techniques that have been field tested against the global financial giants for years VIRGINIA BEACH, Va., Jan. 24, 2013 /PRNewswire/ -- Healthcare data breaches are rapidly outpacing those of the financial…
Monday, January 21, 2013
Friday, January 18, 2013
Thursday, January 17, 2013
"When the IT employee inserted the drive into a computer with up-to-date antivirus software, the antivirus software produced three positive hits," says the DHS's Computer Emergency Readiness Team (ICS-CERT) in a report.
"Initial analysis caused particular concern when one sample was linked to known sophisticated malware."
The malware, it says, was found on two engineering-based workstations that are critical to the control of the power station. Neither workstation had any effective backup, it says.
And ICS-CERT says another unidentified power plant was also hit by a more sophisticated virus, again introduced on a USB stick. The infection, in a turbine control system, affected around ten computers.
"ICS-CERT continues to emphasize that owners and operators of critical infrastructure should develop and implement baseline security policies for maintaining up-to-date antivirus definitions, managing system patching, and governing the use of removable
media," says ICS-CERT.
Wednesday, January 16, 2013
Monday, January 14, 2013
Friday, January 11, 2013
WASHINGTON (MarketWatch) — Hardly a day seems to go by without news of a cyber-attack or dire warnings about the vulnerability of our nation’s critical computer networks.
Thursday, January 10, 2013
Tuesday, January 8, 2013
- Open a vehicle without a key.
- Find their vehicle without going through an elaborate tagging process.
- Check up on vehicle stats and engine health.
- Monitor driving behavior (useful for parents with teen drivers at home).
- Track and geo-fence a vehicle. (The gadget updates its location every five seconds and can send alerts when the car wanders outside certain pre-established boundaries.)
- Keep simple trip logs for taxes and expense reports.
Read more: http://www.foxnews.com/leisure/2013/01/07/new-device-lets-control-monitor-car-with-your-phone/?intcmp=features#ixzz2HOd9xLEH
Monday, January 7, 2013
American McAfee, who founded the antivirus firm that bears his name and at one stage was worth over $100 million, went on the run at the end of last year after being accused of murdering his next door neighbor in Belize.
He in turn accused the government of a conspiracy against him and claimed that he would be killed if the Belizean police tracked him down. McAfee is now back in the US after slipping across the border into Guatemala.
On his blog, McAfee said last week that following a raid by Belize police at his home in April 2011, he decided to take revenge on the government authorities.
McAfee claims to have purchased 75 cheap laptops and installed invisible keystroke logging software on all of them, meaning they would feed him files and data on command.
He says that he then repackaged the laptops as though they were new and sent them as presents to "government employees, police officers, Cabinet Minister's assistants, girlfriends of powerful men, boyfriends of powerful women".
"I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone's e-mail, Facebook, private message boards, and other passworded accounts," he explained in the post.
"The keystroke monitoring continued after password collection, in order to document text input that would later be deleted. So nothing was missed."
Read more: http://www.digitalspy.com/tech/news/a449121/john-mcafee-claims-to-have-created-spying-operation-i-was-a-spymaster.html#ixzz2HKwIvsgK