Tag Archive for: following

EPA must address deviations, apply patches following IG computer security … – FierceGovernmentIT

EPA must address deviations, apply patches following IG computer security
FierceGovernmentIT
The Environmental Protection Agency needs to correct several deficiencies found in its configuration management program, an internal audit found. Configuration management essentially ensures that software and hardware systems are updated, appropriate …

“computer security” – read more

Russian govt following China’s cyber-espionage playbook – CrowdStrike – Business Spectator


SC Magazine UK

Russian govt following China's cyber-espionage playbook – CrowdStrike
Business Spectator
US cybersecurity firm says it has evidence of govt sanctioned spying on hundreds of American, European and Asian companies for economic gains. You must be logged in to read this article. Not a member yet? Register today ›. iOS devices image. Business 
Report: Russia copies China's espionage "play book"SC Magazine
Researchers say they see Russian hackers' hands in cyber espionage against Washington Post (blog)
Iran and Russia blamed for state-sponsored espionageSC Magazine UK
Sydney Morning Herald
all 75 news articles »

Espionage China – read more

Following the evolution of cybercrime, mobile security – Computerworld (blog)

Following the evolution of cybercrime, mobile security
Computerworld (blog)
Last year, Microsoft researchers reported finding pharmacy and penny stock spam coming from a botnet of Android devices. In April, the world's largest spam botnet of PCs was found spewing Viagra ads and get-rich schemes to Android devices infected with 

and more »

android botnet – read more

Yahoo Mail reportedly loses key customer following mass hack attack

BT, the UK-based telecommunications company with more than 18 million customers, is dumping Yahoo Mail following a successful hacking campaign that hijacked e-mail accounts and used them to send spam, according to published reports.

BT’s plans come four months after Ars was among the first publications to report on the mass campaign. At the time, attackers were able to commandeer Yahoo Mail accounts because administrators had failed to apply an eight-month-old security patch in the WordPress content management system that powered one of its blogs. By including malicious JavaScript in innocuous-looking webpages, the attackers were able to exploit the vulnerability and seize control over Yahoo Mail accounts that happened to be open while the booby-trapped webpages were viewed.

In March, more than two months after Yahoo finally applied the WordPress fix, criminal spammers continued to hijack Yahoo Mail accounts, suggesting that other security holes remained. That same month, Vivek Sharma, the general manager of Yahoo Mail and Yahoo Messenger products reportedly vacated his post for unknown reasons.

Read 2 remaining paragraphs | Comments


Ars Technica » Technology Lab