Author

eccuni

Romanian Attacker Exposes Vulnerabilities of NASA Servers

R

An attacker has exposed the security flaws on the website of National Aeronautics and Space Administration (NASA). The intruder, who identifies himself as TinKode, successfully gained access to the File Transfer Protocol (FTP) server associated with the space agency’s Goddard Space Flight Center. The intruder has also placed screenshot of the affected server as evidence of the security...

Finnish Police Bust Internet Crime Ring

F

Recently, counter crime agencies in Finland busted a cybercrime ring, which attempted to steal funds from accounts of legitimate banking customers. Attackers purportedly used a financial Trojan to extract login credentials of around 89 customers of Nordea Bank early last year. Cybercriminals were successful in stealing around 1.2 million Euros. However, information security professionals of the...

Massachusetts State Labor Departments Face Virus Attack

M

Computer systems and networks are susceptible to cyber-attacks. Cybercriminals may compromise systems by exploiting vulnerabilities in IT infrastructure, using social engineering techniques to trick users to follow their instructions to install malware or virus. Attackers may gain remote access to the affected computers, and issue arbitrary commands. Recently, Executive Office of Labor and...

Skimming attacks Rise in Germany

S

Skimming is one of the techniques used by cybercriminals to defraud legitimate banking customers. Usually, cybercriminals install skimming devices on card slot to extract card information. They record personal identification numbers (PIN) of individuals through hidden pin-hole cameras, and inserting cameras in smoke detectors, or ceilings above an ATM. Cybercriminals may also place fake typing...

Cyber-fraudsters Target Media, Space Agency and University Portals

C

Recently, the website of Pravda (The Truth), a major Russian newspaper suffered security breach. Cybercriminals allegedly inserted malicious scripts on the site. The malicious scripts are designed to compromise vulnerable computer systems. Security researchers at F-Secure have detected that the webpage surreptitiously load malicious scripts to exploit Java vulnerabilities and installs malware in...

Scammers Use Counterfeit Security Scanners to Extract Personally Identifiable User Information

S

Cybercriminals constantly find ways to exploit software vulnerabilities and user negligence to install malware or extract confidential information. While some of the scams have become common, cybercriminals tend to repackage, refine and make use of new themes to defraud users. In the recent times, cybercriminals have been quick to exploit events such as Royal Wedding and Osama bin Laden’s...

Security Breach Incidents Attract Law Suits from Customers

S

Organizations are required to ensure availability, confidentiality and integrity of information. The risks inherent in the Internet environment make it necessary for organizations to ensure protection of user information and identity. On the other hand, cybercriminals always look for ways to breach the security of the IT infrastructure. Intrusions and security breach incidents have adverse...

Cyber-fraudsters Abuse Osama’s Death to Deceive Users

C

The news of Osama bin Laden’s death, almost 10 years after 9/11 attack, was bound to attract attention of people worldwide. Such events generate huge interest and curiosity among people and result in increased Google searches and tweets. While Google rated search for the phrase ‘osama bin laden dead’ as ‘Volcanic’, the highest rating for trends, Twitter registered around 5,106...

Security Experts Caution NACHA Members on Zeus Trojan Attack

S

Zeus Trojan is back in the news again. Internet security firm Sophos has alerted users on a new scam, wherein Trojan targets members of National Automated Clearing House Association (NACHA), which handles the development, administration and governance of Automated Clearing House (ACH) network. Cybercriminals are allegedly sending cleverly crafted e-mails to the members of NACHA enticing them to...