Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
Samsung Galaxy S5 Fingerprint Hack Threatens Mobile Money
The Samsung Galaxy S5 has been on the market for only a matter of days, with its highly anticipated fingerprint scanner that will work with PayPal for mobile purchases. But there’s just one problem: German researchers have managed to fool the scanner w…
Evolving DDoS Tactics Hijack Internet and Cause Attack Surge
Purveyors of distributed denial of service (DDoS) attacks are chewing up more bandwidth than ever before, and, according to Akamai Technologies’ Prolexic Q1 2014 Global DDoS Attack Report, are looking to turn the internet into one on-demand botnet than…
Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5
Samsung and PayPal have announced that they will be using the S3 Authentication Suite from Nok Nok Labs to leverage the emerging Fast IDentity Online (FIDO) standards for mobile payments.
Japan Awaits Its First Bitcoin ATM
Japan’s first bitcoin ATM will soon be landing in that country, earmarked for unveiling in Suzuka City, home of Japan’s Grand Prix event. From there, it will go on to a permanent location, to be determined.
Stealer Trojan Becomes Mobile Malware Leader
It’s no secret that mobile malware is growing exponentially, with Android bugs leading the way, but one stands out above the rest: The Trojan-SMS.AndroidOS.Stealer.a – better known as ‘Stealer’ – has become a leader in terms of the number of attempted …
CloudFlare Launches Bug-Hunting Program
CloudFlare has launched a vulnerability disclosure program, facilitated by HackerOne’s bug reporting platform. The vendor is inviting the security community to report any flaws members may have discovered, track CloudFlare’s progress in addressing it, …
Siemens among Industrial Control Systems Vulnerable to Heartbleed Flaw
The Heartbleed flaw in OpenSSL is continuing to leave gaping holes in the security perimeter for organizations worldwide, including within industrial control systems. It turns out that certain Siemens and Innominate ISC products are vulnerable to this …
Disintegration of Trust in Cyberspace Must Drive New Security Attitudes
The revelations in 2013 that governments and their agencies have been spying on citizens in the name of national security have seriously undermined trust when it comes to operating in cyberspace, according to the Information Security Forum (ISF).
Netflix Scam Uses Elaborate Tech Support Ruse
Netflix is being used in a new phishing scam that lures victims into calling a “tech support” line, connecting to a live human that proceeds to probe around the user’s PC and lift information, behind an elaborate cover.