Search Results for "Target"

Are Security Firms Ducking Attribution for VOHO? (Rhymes with ‘Carolina’)

RSA left few stones unturned in its recent report (PDF) on the so-called “VOHO” attacks against pro democracy, military industrial base and high finance firms. But one question that was notably left unanswered was perhaps the most important: “Who, or what, was behind the attacks?” Now the  lead RSA security researcher trusted with analyzing the malware used in recent “watering hole” attacks tells Security Ledger that the malware left some clues as to the origins of the attacks, which affected tens of thousands of systems in more than 700 organizations, but not enough to conclusively link VOHO to a specific group, country or actor. “It’s hard to tell,” said Chris Elisan, a Principal Malware Scientist at RSA and the lead investigator into the malware used in the VOHO attacks. “The malware is only part of it,” he said. Other parts of what Elisan called the “attack chain” are needed to identify […]

Microsoft: Freeware, Pirate Software Supply Chain Leads to Infections

The Internet is a dangerous place, in general. And, depending on what you’re looking for online, it might be very dangerous, indeed, according to Microsoft. Writing in the company’s latest Security Intelligence Report, Microsoft said that its Malware Protection Center (MMPC) has observed an increase in malicious code infections that emanate from what it calls the “unsecure supply chain”  – the informal network of legitimate and underground web sites that distribute freeware and pirated software. Freeware that promises to generate registration keys for popular products like Adobe’s Photoshop, Microsoft Windows and games such as Call of Duty were among the most commonly associated with malicious programs, Microsoft said.  Internet users hoping to unlock pirated software download the key generators believing that they will produce a valid registration key, but often end up infecting their system in the process. But malware authors and cyber criminal groups will also wrap their creations in with […]

FTC Releases Google Privacy Report – Minus The Juicy Details

Google could tell you about its privacy practices except, well….they’re private. That’s the conclusion privacy advocates are drawing after the Federal Trade Commission took a black marker to an independent audit of the company’s privacy practices before releasing it to the group EPIC in response to a Freedom of Information Act (FOIA) request. The FTC released a copy of a Price Waterhouse Coopers audit (PDF) of Google that was mandated as part of a settlement with the FTC over complaints following a 2010 complaint from EPIC over privacy violations in Google Buzz, a now-defunct social networking experiment. However, the agency acceded to Google requests to redact descriptions of the search giant’s internal procedures and the design of its privacy program. “Part of that (Google Buzz) settlement requires that Google implement a ‘comprehensive privacy program,’ EPIC Consumer Protection Fellow David Jacobs wrote to Security Ledger. “Part of that settlement also requires that […]

After VOHO Attacks, Organizations Face Arduous Clean Up

News about the so-called VOHO “watering hole” attacks have faded from the headlines, but the hard work for hundreds of organizations who were victims of the attacks has just begun. The first step for many firms is figuring out if they were victims.

About Security Ledger

Welcome! The Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives. Founded in 2012, The Security Ledger has been recognized for breaking coverage of security-related issues, including leading edge coverage of security as it relates to The Internet of Things. We were voted a Top 100 Information Security Blog in 2017. Security Ledger stories regularly appear on the front page of Slashdot.org, as well as Reddit, Techmeme, and other leading technology news sites. We have also been recognized by leading industry publications for our pioneering work as an editorially independent, privately sponsored news website. If you’re interested in becoming a Security Ledger sponsor, contact Trecia (trecia@securityledger.com) or visit our Sponsorship page to request a […]