1600 Burrstone Road, Utica, NY 13502
(315) 792-3006
webmanager@utica.edu

Tag: Cyberattacks

Cybercrooks use photo-sharing to plant malware in online auto ad scams, FBI warns

(Naked Security) Beware the auto seller on Craigslist who says he’ll send photos on request – he could well be a crook who sends photos packed with malware, the US Federal Bureau of Investigations (FBI) has warned. In a posting on its news blog, the FBI says it’s seeing scam artists posting ads without pictures…
Read more

Microsoft, FBI Slam Door On Thousands Of Citadel Botnets

(Dark Reading) A joint effort by Microsoft, the FBI, and partners in the financial services and tech industries has disrupted more than 1,400 botnets that were using a piece of notorious banking malware responsible for more than a half-billion dollars in losses worldwide. The operation, which marks Microsoft’s seventh botnet takedown to date, began in…
Read more

Defense Industrial Base Wary of Cybersecurity Laws

(National Defense Magazine) That hackers are intent on stealing U.S. trade secrets — particularly those pertaining to the military — is a given. That the United States is capable of responding to this threat remains to be seen. President Barack Obama earlier this year released an executive order aimed at guarding critical infrastructure in private…
Read more

Negligence, Glitches Push Up Cost Of Breaches Worldwide

(Dark Reading) The costs of data breaches inched up globally, but in the U.S. companies have managed to continue bringing breach costs down, according to the eighth annual Cost of Data Breach Study out this week. Conducted by Ponemon Institute on behalf of Symantec, the study found that mistakes and human errors accounted for the…
Read more

Mandatory 2-year jail sentence for EU hackers a step closer

IDG News Service – Hackers would face a minimum two-year prison sentence under a new, draft European Union law approved by the European Parliament’s civil liberties committee on Thursday. Meanwhile, criminals responsible for cyber attacks against “critical infrastructure,” such as power plants, transport networks and government networks would face at least five years in jail.…
Read more

Peer-to-Peer Botnets Resilient to Takedown Attempts

(Threatpost) The FBI, Justice Department and technology companies have had success shutting down botnets that rely on a centralized infrastructure and command and control servers to communicate with bots, steal data or send malicious commands. Peer-to-peer botnets, however, have proven more difficult to take down. More criminal gangs who ply in financial fraud, identity theft…
Read more

Hacking Drones … Overview of the Main Threats

(Infosec Institute) The Unmanned Aerial Vehicles (UAVs), also known as drones, represent a revolution in the security context; these powerful systems could be used in various contexts such as military and also civil sector. Drones use most advanced technological equipment and the research on these vehicles is providing continuous improvements, the scope is the definition…
Read more

Security firm warns of malware that touts the day’s headlines

(PC World) Spammers thrive on getting clicks and are continuously looking for legitimate and illegitimate ways to lure in new victims. Tragic events worldwide are not off limits to cybercriminals, with many capitalizing on these events in order to profit. The latest AVG Insights Report reveals how millions of false links were distributed to curious…
Read more

Password crackers go green by immersing their GPUs in mineral oil

(Ars Technica) Going where few password crackers have gone before, a team of security consultants has deployed a cracking-optimized computer that’s completely submerged in mineral oil. Members say the setup offers significant cost savings compared with the same machine that uses air to stay cool. The rig contains two AMD Radeon 6990 graphics cards, long…
Read more

Malware going retro in 2013, security firm finds

(CSO) Malware perpetrators turned to their old tricks in the first quarter of this year, a threat report released Monday by the cybersecurity firm McAfee finds. The report noted malicious trends that had gathered steam over the last three quarters of 2012 declined during the quarter ending in March, including: Android malware samples captured during…
Read more