Yearly Archives: 2012

Unencrypted Payment Data On Business Networks At 70 Percent


November 29, 2012 By
The Vigilant Application Owner

Help Net Security – (International) Unencrypted payment data on business networks at 70 percent. SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted Primary Account Number (PAN) storage remains alarmingly high. Virtually no change occurred between 2011 and 2012, with card data storage on corporate systems declining less than one quarter of a […]

Continue reading...

U.S. Software Firm Hacked For Years After Suing China


By
The Vigilant Application Owner

The Register – (International) U.S. software firm hacked for years after suing China. A Californian software company which sued the Chinese government for pirating its flagship content filtering product has revealed how it was targeted by hackers from that country for the 3 years of the resulting legal proceedings. Santa Barbara, California-based Solid Oak Software […]

Continue reading...

Pacemakers, Other Implanted Devices, Vulnerable to Lethal Attacks


November 28, 2012 By
The Vigilant Application Owner

Homeland Security News Wire – (International) Pacemakers, other implanted devices, vulnerable to lethal attacks. IT experts reported security flaws in pacemakers and defibrillators could be putting lives at risk, stating that many devices are not properly secured and therefore are vulnerable to hackers who may want to commit an act that could lead to multiple […]

Continue reading...

U.N. Atom Agency Says Stolen Information On Hacker Site


November 27, 2012 By
The Vigilant Application Owner

Reuters – (International) U.N. atom agency says stolen information on hacker site. The U.N. nuclear watchdog said information stolen from one of its former servers had been posted on a hacker Web site November 27, and it was taking “all possible steps” to ensure its computer systems and data were protected. The stolen information was […]

Continue reading...

Java Zero-day Exploit On Sale For ‘Five Digits’


By
The Vigilant Application Owner

Krebs on Security – (International) Java zero-day exploit on sale for ‘five digits’. Miscreants in the cyber underground are selling an exploit for a previously undocumented security hole in Oracle’s Java software that attackers can use to remotely seize control over systems running the program, KrebsOnSecurity has learned. The flaw, currently being sold by an […]

Continue reading...

eBay Closes Critical Security Holes


November 25, 2012 By
The Vigilant Application Owner

The H – (International) eBay closes critical security holes. The online auction house eBay has fixed two vulnerabilities in its U.S. Web site. One of the vulnerabilities was a critical SQL injection hole in the site’s selling area that gave potential attackers unauthorized read and write access to one of the company’s databases. The hole […]

Continue reading...

Numerous .eu Domains Registered To Host BlackHole Exploit Kit


November 23, 2012 By
The Vigilant Application Owner

Softpedia – (International) Numerous .eu domains registered to host BlackHole exploit kit. Security researchers from Sophos reveal that a number of malicious .eu domains have been registered by cybercriminals and set up to host the – 11 – infamous BlackHole exploit kit. In order to avoid security filtering, cybercrooks have registered several domains, which they […]

Continue reading...

Rootkit Infects Linux Web Servers


November 21, 2012 By
The Vigilant Application Owner

The H – (International) Rootkit infects Linux web servers. A previously unknown rootkit is infecting Linux Web servers and injecting malicious code into Web pages served by infected servers. The rootkit was discovered by a user of security mailing list Full Disclosure, who posted his observations, including the suspicious kernel module, to the mailing list. […]

Continue reading...

Nexus Bolsters Component Management Capabilities


November 15, 2012 By
Manfred Moser

When Maven Repository Managers (MRM) first appeared on developers’ radar, everyone using them immediately saw the benefits. Right off the bat, MRMs replaced cobbled together solutions like shared drives or local Maven repositories copied and exposed via http. Since its release four years ago, Sonatype Nexus has grown to support many repository formats. And most […]

Continue reading...

Intel Corporation: McAfee Threats Report Shows Global Expansion Of Cybercrime


November 14, 2012 By
The Vigilant Application Owner

Business Wire – (International) Intel Corporation: McAfee Threats Report shows global expansion of cybercrime. McAfee November 14 released the McAfee Threats Report: Third Quarter 2012, which explores techniques in cybercrime as well as the global evolution of cyber exploits. The latest report uncovers new details of “Operation High Roller.” It states that mobile malware almost […]

Continue reading...