Think Information. Think Security.
 
Picture
We have seen quite few a massive security breaches which make all of you go lol the past decade, and in the recent pact, hactivist groups have emerged with anonymous considered the Mother-of-All. Not all hacks are perpetrated in the name of altruistic goals however some are just for fun and others have money as their primary motive.

CopyrightLabs vs Anonymous

Last June, when the Indian government had forced all ISPs to block access to certain p2p, torrent and all video sharing sites, Anonymous had retaliated in numerous ways. Even after the ban was lifted the hacker group started targeting those institutions that were still sending individual URL take down notices to all the hosts. 


 
Picture
The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices entering their corporate networks, advanced persistent threats and third-party application vulnerabilities are their primary pain points moving into 2013. A few short years ago, these concerns barely made the list.

One of the top concerns cited was the proliferation of personally-owned mobile devices in the workplace such as smartphones and tablets. 80% of those surveyed said that laptops and other mobile data-bearing devices pose a significant security risk to their organization’s networks. Yet, with only 13% stating they use stricter security standards for personal over corporate-owned devices and 29% reporting no security strategy for employee-owned devices at all, there is a clear disconnect between awareness and action.


 
Picture
A Californian software company which sued the Chinese government for pirating its flagship content filtering product has revealed how it was targeted by hackers from the People’s Republic for the three years of the resulting legal proceedings.

Santa Barbara-based Solid Oak Software filed the civil lawsuit against China after discovering thousands of lines of code from its parental filtering CYBERsitter had been lifted and used to develop the Green Dam Youth Escort – Chinese software which was originally intended to be rolled out nationally by the government. Just 12 days after Solid Oak founder Brian Milburn went public with his intentions, the hackers began targeting his employees with a view to infiltrating the company, gleaning intelligence about the court case and disrupting sales as much as possible, Bloomberg reported.


 
Picture
In an ironic twist, the purveyors of extortion malware known as Reveton are using the Internet Crime Complaint Center (IC3) name to lend credibility to their attempted heists. IC3 serves as the national clearinghouse for online complaints, such as Reveton, and is the entity that published an alert Friday about the latest iteration of the Reveton threat.

Users typically fall victim to Reveton unexpectedly and unknowingly, through a tactic known as drive-by downloads in which their machines are infected simply when they visit a compromised site. Once their computers are hit, they freeze up, and users are greeted with a bogus notice on the screen that claims they have violated federal law -- typically for copyright or child pornography infractions --and they must make a payment via prepaid money card in order to regain control of their PC.


 
Picture
The latest scandal on the block, it seems like a noted Chinese hacker known as Wicked Rose or Withered Rose is involved with the Antivirus startup Anvisoft. The hackers real name is Tan Dailin and he was previously involved in the hacking of some US defence contractors. 

Antivirus startup Anvisoft was founded by an infamous Chinese hacker who allegedly cut his teeth exploiting Microsoft Office security holes to hack US defence contractors, it has emerged.