Jan 23 2013

Critical Infrastructure Systems Seen as Vulnerable to Attack


Author: admin | Category: Information Security | Leave a Comment

Spear phishing is the starting point for many attacks against the computers run by power companies. A recent test of the resiliency of power systems to social engineering showed 26 percent of employees who work closely with industrial control systems fell victim to the social engineering attack. Among their job titles were: a control room…..

Continue Reading
Jan 19 2013

Foxit Updates PDF Reader to Fix Critical Flaw


Author: admin | Category: Information Security | Leave a Comment

Foxit has released an updated version of its Foxit Reader PDF viewer plug-in that fixes a critical remote code execution flaw. The vulnerability affected the browser plug-in for Firefox, Chrome, Opera, and Safari. Users are urged to upgrade to Foxit Reader version 5.4.5. Fixed a security issue where attackers can exploit a web browser plugin…..

Continue Reading
Jan 19 2013

Red October Hackers Exploited Known Java Vulnerability


Author: admin | Category: Cyber Security, Featured, Information Security, Vulnerability Assessment | Leave a Comment

Among the attack vectors employed by those behind the Red October cyberespionage campaign was an old Java exploit. Red October, which appears to have been operational for at least five years, targeted diplomatic, military, and government data on computer systems and mobile devices. Kaspersky Labs disclosed their discovery of Red October on Monday, January 14……

Continue Reading

Categories

Tags

Archives