Intrusion Detection

Intrusion Detection | News, how-tos, features, reviews, and videos

Hacked Synology NAS systems used in high-profit cryptocurrency mining operation

A hacker earned over $600,000 by infecting network-attached storage devices with Dogecoin mining malware, Dell SecureWorks researchers said

Global mobile roaming hub accessible from the Internet and vulnerable, researchers find

The GPRS Roaming Exchange (GRX) network, which carries roaming traffic among hundreds of mobile operators worldwide, contains Internet-reachable hosts that run vulnerable and unnecessary services, recent security scans reveal.

New attack methods can 'brick' systems, defeat Secure Boot, researchers say

The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.

Vessel-tracking system vulnerable to denial-of-service, other attacks, researchers say

Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers.

New security problems keep eBay on edge

EBay's security team isn't going to get a break for a while.

Needed: Breach detection correction

There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and...

Avast takes community forum offline after data breach

Prague-based antivirus company Avast said Monday it took its community forum offline after a data breach, but payment information was not compromised.

Researchers find large global botnet of infected PoS systems

Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries.

Point-of-sale attacks accounted for a third of data breaches in 2013, report says

A third of data breaches investigated by security firm Trustwave last year involved compromises of point-of-sale (PoS) systems and over half of all intrusions targeted payment card data.

Public utility compromised after brute-force attack, DHS says

A public utility in the U.S. was compromised after attackers took advantage of a weak password security system, according to a U.S. Department of Homeland Security team that studies cyberattacks against critical infrastructure.

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies.

Home routers: Broken windows to the world

For most people, a home router is their window to the world -- the World Wide Web.

US Justice Department to charge Chinese military officials with hacking

The U.S. Department of Justice is preparing to charge Chinese military officials with hacking US companies to obtain trade secrets.

'Elderwood' hackers continue to set pace for zero-day exploits

Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec.

Target, The Gap and others form group to share cyberthreat data

Some of the biggest U.S. retailers have banded together to share information about cyberthreats, in a bid to avert breaches like that suffered by Target last holiday season.

Estonian electronic voting system vulnerable to attacks, researchers say

The electronic voting system that has been used in Estonia since 2005 cannot guarantee fair elections because of fundamental security weaknesses and poor operational procedures, according to an international team of security and...

Time to modernize thinking, technology in fighting malware

A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious...

DOJ asks for new authority to hack and search remote computers

The U.S. Department of Justice wants new authority to hack and search remote computers during investigations, saying the new rules are needed because of complex criminal schemes sometimes using millions of machines spread across the...

Bitly discloses account compromise, urges users to change passwords

On Thursday evening, Bitly (bit.ly), one of the Web's largest URL shortening services, urged users to reset their API keys, OAuth tokens, and passwords.

Hackers hoped for slam dunk on Japan Basketball Association website

The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman is a high-ranking Japanese government official.

Load More
Top News