Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

security code big data cyberespionage DDoS

Rent-a-botnet services making massive DDoS attacks more common than ever before

There were 19 distributed denial-of-service (DDoS) attacks that exceeded 100 Gbps during the first three months of the year, four times more than in the previous quarter.

security hacker

Check your BITS, because deleting malware might not be enough

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've already been cleaned by antivirus products.

code big data binary programming

Widespread exploits evade protections enforced by Microsoft EMET

Hackers have launched large-scale attacks that are capable of bypassing the security protections added by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a tool whose goal is to stop software exploits.

Mark Zuckerberg (1)

Hackers breach social media accounts of Mark Zuckerberg and other celebrities

Over the weekend hackers have managed to gain access to Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities.

150817 google marshmallow 06

Android gets patches for serious flaws in hardware drivers and media server

The June batch of Android security patches address nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers.

wordpress logo

A new WordPress plug-in exploit endangers thousands of websites

Since last week attackers have exploited an unpatched vulnerability in a WordPress plug-in called WP Mobile Detector that was installed on over 10,000 websites.

security code big data cyberespionage DDoS

Mysterious malware targets industrial control systems, borrows Stuxnet techniques

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes.

xx

Extortion schemes expand, threatening consumers and businesses with data leaks

Hackers use high-profile data breaches as opportunity to extort money from victims by threatening to release personal and sensitive data about them.

20160224 stock mwc lenovo booth sign

Lenovo advises users to remove a vulnerable support tool preinstalled on their systems

PC maker Lenovo is recommending users remove an application preloaded on their computers because it contains a high-severity flaw that could allow attackers to take over their systems.

microsoft headquarters

Cost of a Windows zero-day exploit? This one goes for $90,000

A hacker is trying to sell a zero-day privilege escalation exploit that allegedly affects all Windows versions and bypasses all common exploit mitigations on a cybercrime forum.

code big data binary programming

OEM software update tools preloaded on PCs are a security mess

Security researchers have found serious flaws that could lead to full system compromises in the software update tools installed on computers by five PC manufacturers.

tumblr logo

65 million Tumblr account records are up for sale on the underground market

A hacker is selling 65 million email addresses and hashed passwords stolen from Tumblr in 2013.

jetpack logo

Flaw in popular WordPress plug-in Jetpack puts over a million websites at risk

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks.

atm cash machine money

Shared malware code links SWIFT-related breaches at banks and North Korean hackers

Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of $81 million from Bangladesh central bank earlier this year.

Digital Key, security, encryption

New JavaScript spam wave distributes Locky ransomware

Over the past week, computers throughout Europe have been hit by a massive email spam campaign carrying malicious JavaScript attachments that install the Locky ransomware program.