Tag: vulnerabilities

Nokia data shows a steady increase in infected mobile device traffic. (Image courtesy of Nokia.)

Android Malware Doubled in 2016, Adding to Mobile Malware Problem

In-brief: Smart phones infected with Android malware jumped 95 percent between 2015 and 2016, part of a steady increase in mobile phone infections in recent years, Nokia said on Monday.

Most U.S. adults had trouble identifying key cyber security concepts including what data was secure online and the definition of a botnet.

You Don’t Know Hack: Public Struggles with Cyber Security Concepts

In-brief: U.S. adults may be able to identify a strong password when they see one, but on many questions of how to identify and protect themselves from online threats, they are worryingly ignorant, according to a new survey by The Pew Center.

Insecure network attached storage devices are the common thread in a string of data breaches, including the recent leak of US Air Force personnel files, security experts say.

NAS Holes: Air Force Data Leak the Tip of Very Large Iceberg

In-brief: The recently disclosed trove of personnel files by an US Air Force officer is one piece of a much larger phenomenon: exposed, vulnerable and Internet-connected network attached storage (or NAS) devices chock full of gigabytes sensitive data.

Twitter accounts belonging to media organizations and prominent personalities (like tennis great Boris Becker) were hacked and hijacked, displaying pro Turkish messages accusing Dutch and German officials of Nazi sympathies. (Image courtesy of Twitter.)

Twitter Hack is latest to underscore Third Party App Risk

In-brief: security experts are warning about the threat posed by third-party applications that tap into prominent social media platforms like Twitter after accounts belonging to media organizations and prominent personalities were hacked and hijacked to display messages accusing Dutch and German officials of Nazi sympathies. 

The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored "advanced persistent threat" groups, the firm FireEye said in its most recent M-Trends report.

Report: Hacking Crews are all APT now

  In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.