"[U]sing information from a 10-country survey of … Read more
Recently, the General Services Administration sent an e-mail alert to users of its System for Award Management (SAM), reporting that a security vulnerability exposed the users' names, taxpayer identification numbers (TINs), marketing partner information numbers, and bank account information to "[r]egistered SAM users with entity administrator rights and delegated entity registration rights."
The notice warned that "[r]egistrants using their Social Security Numbers instead of a TIN for purposes of doing business with the federal government may be at greater risk for potential identity theft." Also provided was a link to a page on the agency's site … Read more
Security company Dr. Web is reporting on a new adware Trojan attack that is targeting Mac users, where malicious Web sites will trick users into installing a plugin that will track your browsing and display ads to you.
The malware, called "Yontoo," will be first encountered as a media player, download manager, or other plug-in requirement for viewing contents on some maliciously crafted Web sites disguised as sources for file sharing and movie trailers. When the plug-in prompt is clicked, you're redirected to a site that downloads the Trojan installer and requires you to run it. The … Read more
Apple's XProtect system (aka File Quarantine) in OS X is a rudimentary anti-malware scanner that will perform a quick check on downloaded files to make sure they do not contain known malware, and will block any versions of Web plug-ins like Java and Flash that have known vulnerabilities.
XProtect runs in the background with no interaction with the user, which is convenient, but it does mean that when it gets updated, users may find themselves unexpectedly unable to access some Web content. Even though quickly updating plug-ins should get you around this inconvenience, it may be useful to know … Read more
I feel sure this story might be an inspiration to some, especially those who enjoy showing solidarity for their fellow worker.
For it seems that several doctors in Sao Paulo, Brazil, decided there was a way to fool the biometric scanners on which they clocked in with their fingers.
They allegedly created more fingers. Fake ones, out of silicone.
As AFP reports, an investigation by Globo television showed a doctor using the fake fingers to fool the machines.
The machines dutifully printed out a paper record of a doctor's attendance, when he or she wasn't actually there.… Read more
The next time you're looking for your misplaced Android smartphone, check the freezer. It's possible, however unlikely, that someone is trying to hack into your data using a new FROST attack method.
Researchers at Friedrich-Alexander University in Germany have learned that it is possible to access personal information on Android 4.0 smartphones using a chilling technique.
Called FROST, or forensic recovery of scrambled telephones, it amounts to placing the phone in temperatures of -15 Celsius for roughly 1 hour. After removing from a freezer, you must repeatedly power on and off the phone and hold down the … Read more
If you are considering security software for your Mac there are a number of options out there, including those from popular companies like Sophos, Symantec, and Intego. There are both free tools and paid subscriptions to choose from.
A while ago I gave Intego's SecurityBarrier X6 suite a spin, which in testing has been found to be one of the better-performing anti-malware tools for OS X; however, the software did require a bit of a technical approach that was not too appealing to the average user.
Identity thieves are more active than ever. In 2012, the Federal Trade Commission received more than 2 million consumer complaints overall, and for the 13th consecutive year, identity theft was the most-common complaint category: 369,132 ID-theft reports were added to the FTC's Consumer Sentinel Network in the year, an increase of more than 30 percent from 2011.
Last week the FTC released its 2012 Consumer Sentinel Network Data Book (PDF). According to the report, the fastest-growing category of identity theft relates to government documents and benefits: complaints in this category increased 46 percent from calendar-year 2010. Credit-card fraud (… Read more
Looks like someone in the New York City area needs to keep their robot plane on a shorter leash.
Federal authorities are investigating today after the pilot of an Alitalia flight spotted what appeared to be a small, unmanned drone hovering close by as the passenger flight made its approach in to New York's JFK airport on Monday afternoon. The drone reportedly came within 200 feet of the jet.
Don't get all panicky over the prospect of a possible al Qaeda sleeper cell in Queens though. The eyewitness said the drone was black in color, no more than 3 feet wide, and had four propellers -- a description much more similar to a Parrot drone than a Predator.… Read more
SAN FRANCISCO--Of all the multitudes of phones launching amid the grandeur of Barcelona this week, Motorola Solutions quietly broke champagne over one device from the back corner of a convention center here.
The Motorola AME 2000, originally announced a few weeks back, is not a phone for the average consumer. That makes sense, given that its public bow was at the RSA Conference 2013 this week, an annual confab of security nerds, experts, researchers, enterprise security vendors, and government representatives.