je.st
news
Tag: attackers
Industrial control systems targeted by malicious attackers, research shows
2013-08-01 23:04:47| InfoWorld: Top News
Attackers are actively targeting Internet-connected ICSs (industrial control systems) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.
Tags: research
control
systems
shows
Attackers embedding back doors into image files
2013-07-19 20:45:57| InfoWorld: Top News
Researchers at Sucuri, a firm focused on website security awareness and attack recovery, have discovered attackers using a known, but a rather uncommon method of maintaining access to an already compromised server: They're hiding back doors inside the headers of legitimate image files.
Android vulnerability allows attackers to turn apps into Trojans without breaking their signatures
2013-07-03 20:05:32| InfoWorld: Top News
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS. Researchers from San Francisco mobile security startup firm Bluebox Security found the flaw and plan to present it in greater detail at the Black Hat USA security conference in Las Vegas later this month.
Tags: their
turn
breaking
signatures
The bra designed to shock attackers
2013-04-16 01:49:08| BBC News | Business | UK Edition
The most shocking bra you are ever likely to see
Tags: designed
shock
bra
attackers
6 IT security innovations to keep you ahead of attackers
2013-03-26 15:49:26| InfoWorld: Top News
Security threats abound in the enterprise. Today's IT security professionals must worry about malware, spyware, hackers, DDoS attacks, hijacked USB drives, spies, cyber war, and other vulnerabilities too numerous to mention.