Weekend news review: July 7-11

Advanced attack group Deep Panda uses PowerShell to breach think tanks

Advanced attack group Deep Panda uses PowerShell to breach think tanks

CrowdStrike revealed that the attack group is now targeting sensitive data about political affairs in Iraq. <a style="color: #FFFFFF" href="http://bit.ly/VUeuDX" target="_blank">Read more</a>
NCL calls on gov’t, business to  better protect consumer data

NCL calls on gov’t, business to better protect consumer data

Noting that consumers are being asked to provide more information than ever before and are less protected, the National Consumers League has proposed reforms. <a style="color: #FFFFFF" href="http://bit.ly/1lQsGmz" target="_blank">Read more</a>
Nude pics, other data, recovered from ‘wiped’ Android phones purchased on eBay

Nude pics, other data, recovered from ‘wiped’ Android phones purchased on eBay

After purchasing 20 "wiped" Android smartphones on eBay, AVAST researchers were able to restore photos and other personal information. <a style="color: #FFFFFF" href="http://bit.ly/1jyRC7R" target="_blank">Read more</a>
Microsoft addresses 29 bugs in IE, Windows, with six bulletins

Microsoft addresses 29 bugs in IE, Windows, with six bulletins

In its monthly Patch Tuesday update, Microsoft plugged a slew of critical bugs in Internet Explorer that could allow remote code execution. <a style="color: #FFFFFF" href="http://bit.ly/1moMZfH" target="_blank">Read more</a>
Attackers brute-force POS systems utilizing RDP in global botnet operation

Attackers brute-force POS systems utilizing RDP in global botnet operation

Thousands of infected computers around the world are being used to brute-force point-of-sale systems utilizing remote desktop protocols. <a style="color: #FFFFFF" href="http://bit.ly/1nb6GmQ" target="_blank">Read more</a>
Senate Intelligence Committee approves cyber security bill

Senate Intelligence Committee approves cyber security bill

The Cybersecurity Information Sharing Act of 2014 encourages threat information sharing between government and the private sector. <a style="color: #FFFFFF" href="http://bit.ly/1mSs4TJ" target="_blank">Read more</a>
Gmail iOS app vulnerable to MitM attack, emails and credentials at risk

Gmail iOS app vulnerable to MitM attack, emails and credentials at risk

Emails and user credentials can be stolen in a man-in-the-middle attack because the Gmail iOS app does not perform certificate pinning. <a style="color: #FFFFFF" href="http://bit.ly/1wbGjCI" target="_blank">Read more</a>
Two new Boleto malware  families discovered

Two new Boleto malware families discovered

Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions. <a style="color: #FFFFFF" href="http://bit.ly/VSINuA" target="_blank">Read more</a>
Study: Security not prioritized in critical infrastructure, though most admit compromise

Study: Security not prioritized in critical infrastructure, though most admit compromise

Nearly 70 percent of critical infrastructure organizations said they experienced a security compromise in the last year. <a style="color: #FFFFFF" href="http://bit.ly/1reBpEu" target="_blank">Read more</a>

Erasing an Android's memory might make its contents appear to be erased, but in actuality, a savvy hacker could easily recover sensitive data, according to AVAST researchers. Also this week, a bill passed the Senate allowing for the private and government sector to actively communicate cyber security threats between each another. For a deeper look at these news bits, click here to visit our news section.

More Slideshows

Topics:

You must be a registered member of SC Media US to post a comment.