International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Wednesday, October 20, 2010

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a study carried out across the UK. Of the 40,000 networks identified across six cities, just under 20,000 had no password or the most basic form of security encryption, the research for card protection and insurance company CPP found. In the “ethical hacking” experiment, researchers spent half an hour in each city using freely-available software to use as many unsecured wireless connections as possible. Nearly a quarter of the private networks (9,249) had no password, despite 82% of Britons saying their network is secure. But the study found even password-protected networks were not secure, with hackers able to breach a typical password in seconds.

 

(Source: Belfast Telegragh)

Full story

Belfast Telegragh

Wednesday, October 20, 2010 2:25:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 

All network security equipment, the strongest of which is used by the financial industry, is exposed to a new kind of online attack, Finnish data security vendor Stonesoft said on Monday. Stonesoft said it has found a new threat category -- advanced evasion techniques (AETs) -- which simultaneously combine different evasions in several layers of networks, and in the process become invisible for security gear. While evasions -- tools hackers often use to penetrate network security -- are nothing new, AETs package them in new ways to let attackers bypass most firewalls and intrusion detection and prevention systems (IPS) without being detected.

This could give them access to data on secure corporate networks and allow them to plant further attacks. "From the point of view of cybercriminals and hackers, advanced evasion techniques work like a master key to anywhere," said Klaus Majewski, business development chief at Stonesoft. "Current protection against advanced evasion techniques is next to zero. This is a new thing and there is no protection against it currently," Majewski said.

 

(Source: Reuters)

Full story

Reuters

Wednesday, October 20, 2010 1:21:54 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Canada is seeing e-health gains in the area of medication, with an estimated $436 million in cost savings and efficiencies this year, a report released Wednesday says. Drug information systems, which are hooked up now mainly in the western provinces and Prince Edward Island and to a lesser extent elsewhere, allow pharmacists and health-care providers to electronically access records of a patient's prescription medications. And they provide a full and accurate medication history so that potential drug interactions or allergies can be caught before they happen. The $436-million tally and report were compiled by Deloitte for Canada Health Infoway, a federally funded organization that was founded in 2001 and charged with helping provinces and territories to adopt electronic health-record projects.

"We expect that number to increase over time as drug information systems are more widely used in the country, and we get more experienced with their use," said Jennifer Zelmer, senior vice-president of clinical adoption and innovation at Infoway.

 

(Source: CBC)

Full story

CBC

Wednesday, October 20, 2010 1:18:51 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, October 14, 2010

Countries all over the world are facing manifold challenges regarding their healthcare delivery. Due to limited budgets and increasing demand for high-quality healthcare services, new cost-efficient, reliable and interconnected systems need to be developed. E-health can make a significant contribution to ensure high-quality, sustainable healthcare systems. The Global E-Health Forum, which will take place on October 25 + 26, 2010 in Hamburg, Germany, will address these challenges.

The primary aim of the organizers of the Global E-Health Forum, the Hamburg Chamber of Commerce, IBM and the European Health Telematics Association (EHTEL), is to provide a cross-sector forum for representatives from hospitals and clinics, governments, health insurance organizations, service providers and the media. Policymakers, users, suppliers and implementation managers will have the opportunity to learn from each other and to develop collaborative working relationships.

 

(Source: Global E-Health Forum)

Full story

Global E-Health Forum

Thursday, October 14, 2010 1:17:40 PM (W. Europe Standard Time, UTC+01:00)  #     | 

INTERPOL has launched an international initiative which will see the world police body provide a list of Internet domains containing severe child sexual abuse content to Internet Access Service Providers (ASPs) voluntarily participating in the scheme to reduce the availability of such material on the Web. Under the scheme, Internet users attempting to access severe child abuse material on the web will be re-directed away, either to an INTERPOL stop page or to an error page.

INTERPOL’s Trafficking in Human Beings unit, which steers the world police body’s combat against child sexual exploitation, will work with the Organization’s National Central Bureaus and international police forces amongst its 188 member countries in updating and enlarging this “Worst of” list of domains containing severe child sexual abuse material, according to criteria defined in collaboration with the pan-European police project CIRCAMP – the COSPOL (Comprehensive Operational Strategic Planning for the Police) Internet Related Child Abusive Material Project.

 

(Source: Interpol)

Full story

Interpol

Thursday, October 14, 2010 12:59:43 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, October 12, 2010

PRE-TEENS should not be on Facebook, insists Queensland Premier Anna Bligh - and the social networking site needs to work harder at enforcing the 13-year age limit. "I think that parents are right when they say that primary school children should not be on Facebook and I support Queensland parents when they say that Facebook needs to do more to address their legitimate fears," Ms Bligh said. "Vigilant parents can email the company if their child is under 13 and the child's site will be shut down.

''Unfortunately, there really is nothing to stop their child setting up another site." Sandy White from Norman Park in Brisbane's inner east is the mother of Thomas, 13, and Ryan, 12. She believes the number of primary school children using Facebook is growing. "I do not allow my boys to have a Facebook account, even though they would love to. It seems the norm these days is for children as young as 10 or 11 to join up but I believe that children of that young age are defenceless to predators.

 

(Source: Queensland Newspapers)

Full story

Queensland Newspapers

Tuesday, October 12, 2010 9:43:56 AM (W. Europe Standard Time, UTC+01:00)  #     | 

Adult websites and applications are too easily accessible to adolescent smartphone users, with the Korean government unable to censor materials uploaded from foreign soil, a lawmaker said Monday. Rep. Han Sun-kyo of the governing Grand National Party (GNP) said that smartphone users, including minors, can access many applications containing sex-related material and games. “Internet users cannot search sites containing adult materials by typing in sex-related words. But if you do that in the App Store and Google-backed Android market, you get up to 900 X-rated applications,” he said during the National Assembly’s audit of the Ministry of Culture, Tourism and Sports. In particular, those who are over 17 can download adult content from the App Store, Han said. “Even if they are minors, they can have access to adult content as long as they type in passwords and click the approve button.” Among the most downloaded applications, one involving sex acts ranked 40th, he said, stressing there are even applications allowing smartphone users to view adult video clips by providing their uniform resource locators (URL).

“The Korea Communication Standards Commission (KOCSC) has recently decided to tighten applications on App Store and other online open application markets, believing there is too much sex-related material. But it is not certain that the commission will be able to apply local regulations to foreign companies,” the lawmaker said.

 

(Source: The Korea Times)

Full story

The Korea Times

Tuesday, October 12, 2010 9:41:28 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, October 06, 2010

Addiction counsellors have told Newsbeat they're seeing more cases of people worried about being hooked on playing video games. There are now calls for the gaming industry to offer more support to people who can't switch off. Technology or computer addiction isn't officially recognised as a clinical condition. But the group representing games companies admits there needs to be more research into the problem.

"Most of the people that are getting into difficulties tend to be in their teenage years and early 20s. "As that generation moves through and others come on behind, I think the problem is going to get bigger."

 

(Source: BBC)

Full story

BBC

Wednesday, October 06, 2010 4:01:37 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Appropriately for a month that concludes with a holiday designed around scary things, October has been declared Cyber Security Awareness Month. President Obama recently signed a proclamation and urged everyone to back up files, keep Internet-surfing children safe, and "play an active role in securing the cyber networks we use every day." National Cyber Security Awareness Month is part of a campaign organized by the National Cyber Security Alliance (NCSA) and backed by the Department of Homeland Security.

The government agency said, "America's competitiveness and economic prosperity in the 21st century will depend on effective cybersecurity." NCSA said October's designation is part of the first Global Online Safety Campaign, called STOP | THINK | CONNECT, which began Monday. The public-private partnership is intended to "help all digital citizens employ universal behaviors to protect themselves," the organization said.

 

(Source: NewsFactor Network)

Full story

NewsFactor Network

Wednesday, October 06, 2010 3:55:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, October 05, 2010

The Department of the Prime Minister and Cabinet has sponsored a new online directory of Australia's security professionals and academia, which aims to highlight leaders in the industry. The National Security Research Directory is a brain's trust of hundreds of experts operating in a burgeoning list of fields across IT security, biometrics and counter-terrorism. It includes research topic areas such as applied cryptography, physical security and "ubervelliance" — a system with the ability to automatically locate and identify individuals and predict their movements.

Deputy national security advisor Margot McCarthy said the network will tighten coordination on matters of national security in the public and private sectors. McCarthy also announced the National Security Advisor's Group within the Department of the Prime Minster and Cabinet, which will report directly to the National Security chief information officer, Rachael Noble, on issues including cybersecurity.

 

(Source: ZD Net)

Full story

ZD Net

Tuesday, October 05, 2010 12:05:15 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Nearly six-in-ten adults (58%) have done research online about the products and services they buy, and about a quarter (24%) have posted comments or reviews online about the things they buy. On a typical day, 21% of adults search for product information online.

This is an increase from 15% in 2007 and 9% in 2004. The 2010 data come from a telephone survey by the Pew Research Center’s Internet & American Life Project conducted between August 9 and September 13, 2010. The survey was administered to a sample of 3,001 adults, age 18 and older, using a combination of landline and cellular telephones. Interviews were conducted in English or Spanish. The sample margin of error is plus or minus 2.5 percentage points for the general population and plus or minus 2.9 percentage points for internet users (n=2,065). Among internet users, 78% say that they at least occasionally conduct product research and 32% report that they have posted online product comments.

 

(Source: Pew Internet Research)

Full story

Pew Internet Research

Tuesday, October 05, 2010 11:57:45 AM (W. Europe Standard Time, UTC+01:00)  #     | 

500 million users worldwide and still growing, Facebook is now ubiquitous. Because of its popularity, minors have jumped onto the social media bandwagon, too, and they use networking the same way adults do--to share pictures, connect with friends, organize events, and play social games. And that can be a problem.

For the most part, Facebook provides a fun and safe way for users of all ages to communicate with their pals. But because kids and teens are, well, kids and teens, they're the ones most at risk of falling victim to the dangers of Facebook. With a bit of strategic parental guidance, you can educate your kids about the potential hazards of social media and give them the tools they need to protect themselves from online predators, guard their personal information, preserve their online reputation, and avoid suspicious downloads that could harm your PC.

 

(Source: PC World)

Full story

PC World

Tuesday, October 05, 2010 11:42:04 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 23, 2010

Students awaiting loans and grants should watch out for scam emails asking for bank details, Student Finance England warns Students were today warned to beware of scam emails purporting to be about loans and grants, after it emerged that 50 phishing websites targeting young people have been shut down during the last year.

Hundreds of thousands of people are starting university in the coming weeks, and Student Finance England, which processes English students' loans and grants, today urged students to "remain vigilant" and not disclose any personal or bank details in response to email requests that look like they are from either itself or its parent company, the Student Loans Company. Student Finance England expects to make payments to more than 600,000 students this week, and fraudsters are taking advantage of the timing to target students who are waiting for money to arrive. Heather Laing, its fraud manager, said: "Students are likely to receive a great deal of correspondence from Student Finance England at this time, with payment schedule letters or letters requesting further information coming through the door. Some students may fall victim to an email request that looks to be from Student Finance England or the Student Loans Company asking for confirmation of bank details. However, we will never ask students to confirm their bank details via email. If they do receive such a request, they should forward it on to us to investigate."

 

(Source: Guardian)

Full story

Guardian

Thursday, September 23, 2010 3:23:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 

For the 10th eLearning Awards, European Schoolnet and ENISA, the European Network and Information Security Agency, announce a new prize category called "Teaching online safety and citizenship".

The rapid spread of internet use among young people is making it essential to address eSafety and ePrivacy, in order to protect young people from online risks and threats and to prepare them to use digital technologies in a secure and responsible way. As a major European actor for eSafety and ePrivacy, ENISA highly encourages all teachers to address these issues with their young students. “Young people and children are today amongst the biggest user groups of online technologies in Europe. It is important to equip them with the skills and knowledge to stay safe online,” said Dr Udo Helmbrecht, Executive Director of ENISA.

 

(Source: ENISA)

Full story

ENISA

Thursday, September 23, 2010 3:06:09 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 21, 2010

Harrisburg University has banned these social media sites, as well as MySpace and AOL Instant Messenger, for one week on the Pennsylvania campus, starting September 13.

The ban is not because of any security or privacy issue. Rather, it is an experiment to make students and faculty members think about the significance of social media and how best to benefit from this channel in its absence. "We're not trying to stop all access to these sites," says Charles Palmer, executive director of the Center for Advanced Entertainment and Learning Technologies. "We're trying to enhance people's ability to reflect on how technology impacts their daily lives and really generate valuable conversations." According to Jeffery Mechling, a prominent author and lecturer at the Harvard Kennedy School, "People depend a lot on those they trust. Making those connections easier is powerful, as social media have demonstrated. But this is a new phenomenon, so studying and understanding better is valuable."

 

(Source: Bank Info Security)

Full story

Bank Info Security

Tuesday, September 21, 2010 4:42:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

In UK, ISPs must pay 25 per cent of the cost of implementing new anti-piracy measures, it has been announced. The process of identifying and informing broadband customers suspected of copyright infringement will be paid for partially by ISPs and copyright holders, who will pay the other 75 per cent.

The decision comes as the government attempts to thrash out the details of how some parts of the controversial Digital Economy Act will actually work in practice. Minister for Communications, Ed Vaizey, said: "Protecting our valuable creative industries, which have already suffered significant losses as a result of people sharing digital content without paying for it, is at the heart of these measures. "The Digital Economy Act serves to reduce online copyright infringement through a fair and robust process and at the same time provides breathing space to develop better business models for consumers who buy music, films and books online.

 

(Source: Webuser)

Full story

Webuser

Tuesday, September 21, 2010 3:25:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 20, 2010

The 2011 Global State of Information Security Survey is a worldwide security survey by PricewaterhouseCoopers, CIO Magazine and CSO Magazine. It was conducted online from February 19, 2010 to March 4, 2010. Readers of CIO and CSO Magazines and clients of PricewaterhouseCoopers from around the globe were invited via email to take the survey. The results discussed in this report are based on the responses of more than 12,840 CEOs, CFOs, CIOs, CSOs, vice presidents and directors of IT and information security from 135 countries. Thirty-seven percent of respondents were from Asia, 30% from Europe, 17% from North America, 14% from South America, and 2% from the Middle East and South Africa. For the main finadins please click here

 

(Source: Price Waterhouse Coopers)

Monday, September 20, 2010 12:59:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Germany is the first country to launch a large scale malware cleaning project backed by the government, Internet service providers and security companies.

The new Anti-Botnet Counseling Center (Anti-Botnet Beratungszentrum) is an organization dedicated to assisting German users with removing botnet infections from their computers. It was established with funding from the Federal Ministry of Interior and the technical assistance is provided by the Federal Office for Information Security (BSI). The initiative was announced late last year as a collaboration between the Federal Government and the German Internet Industry Association (eco).

 

(Source: Softpedia)

Full story

Softpedia

Monday, September 20, 2010 12:56:00 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 16, 2010

Sometimes it's a story of a grown woman who has chosen prostitution as a path to a better life. More often, it's a story of a woman being forced to sell her body by a pimp. And then there are the children, and the mothers that miss them.

"They told me to look on Craigslist and it almost blew my mind," the mother of one missing 12-year-old told CNN. "She was there with a wig on. She was there in a purple negligee. The same day the woman spoke to CNN, her daughter was rescued by police at a seedy hotel near Washington where she was being sold for sex. And she's not alone. The National Center for Missing and Exploited Children's website contains thousands of posters of missing children. Many are girls, classified as "endangered runaways," and the center says more than fifty of them have been pushed into the sex trade. But that's just a snapshot, a tiny indicator of the true scale of the problem.

 

(Source: CNN)

Full story

CNN

Thursday, September 16, 2010 4:57:07 PM (W. Europe Standard Time, UTC+01:00)  #     | 

An awkwardly-worded reply by Defence Secretary Liam Fox to questions in the House of Commons suggests that cuts in information security spending are not on the agenda for the Strategic Defence and Security Review (SDSR), which is due to report back in the Autumn. On the contrary, Britain is looking to boost its capabilities in the area. Cyber-security is an important element of the SDSR and has already had considerable consideration. Decisions on enhancing our capabilities will form part of the review, which we will announce to the House later this autumn.

Developing a military cyber-security policy should not be the responsibility of the Ministry of Defence alone, Fox added. Investing in better cyber-security will not be an option for the United Kingdom. What is being considered under the National Security Council as part of the SDSR is how that occurs. We will face increasing threats in cyberspace in the years ahead-the question is how we identify the weakest areas, which need to be looked at first, and how we develop the technologies so that, as the other technologies that might affect us continue to evolve, we are best protected.

 

(Source: The register)

Full story

The register

Thursday, September 16, 2010 12:42:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The Millennium Development Goals (MDGs) are a set of targets intended to reduce global poverty and improve living standards by 2015. Specific goals target education, fighting disease and promoting gender equality. Access to communications technology is a part of one of the targets. With five years to go until the deadline to achieve the goals, progress remains uneven. Some countries have achieved many of the goals, while others - mostly in the developing world - may not realise any. Many development experts question how the goals will be achieved and how they will be paid for. Some even question whether the approach is necessary or helpful.

But Dr Toure said that he believed technologies such as broadband could be used to "accelerate" progress on the goals and help countries achieve them. "Access to broadband in an affordable manner is our greatest challenge," Dr Hamadoun Toure, secretary general of the International Telecommunications Union (ITU), told BBC News.

 

(Source: BBC)

Full story

BBC

Thursday, September 16, 2010 12:06:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 14, 2010

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.

Some computer security experts are advancing the heretical thought that passwords might not need to be “strong,” or changed constantly. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. In fact, they say, we aren’t paying enough attention to more potent threats. Here’s one threat to keep you awake at night: Keylogging software, which is deposited on a PC by a virus, records all keystrokes — including the strongest passwords you can concoct — and then sends it surreptitiously to a remote location.

 

(Source: The New York Times)

Full story

The New York Times

Tuesday, September 14, 2010 4:10:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 13, 2010

ICT For Health Projects Exhibiting

27 September 2010 - 29 September 2010 Brussels, Belgium

The ICT for Health projects present at the ICT2010 conference. CD-Medics, Epilepsiae, HeartCycle, Hamam and Oldes will be exhibiting. Three eHealth related networking sessions will also take place on the following topics: Patient empowerment, EU-ASEAN Cooperation opportunities and Low-cost Imaging Technologies for Healthcare.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society 

Monday, September 13, 2010 5:47:49 PM (W. Europe Standard Time, UTC+01:00)  #     | 

With its millions of users, the world’s most popular social network has become a perfect target for hackers exploiting such a dense concentration of potential victims. Apart from phishing attacks or spam, which are now easily recognized by many Internet users, hackers are employing new methods, which for the moment at least, are proving to be successful. What to do if your Facebook profile has been hacked

Step 1: Firstly, remove all permissions that have been given to the malicious application. This is a simple process: from Account > Application settings in the top-right corner of your Facebook profile. This ensures that the application will not continue to have access to your profile once the password is changed.

Step 2: Change the login password! To keep your identity safe, it is advisable to change your password and the user name (it’s a good idea to do this from time to time anyway). This is also easy: Go to Account > and Account Settings in the menu in the top left corner of your Facebook profile. It is also advisable to use strong passwords that cannot easily be guessed.

 

(Source: Panda Security)

Full story

Panda Security

Monday, September 13, 2010 5:45:33 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, September 10, 2010

Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. Those who do, will see their computers infected or any data they enter on these pages fall into the hands of criminals. To do this, they use an average of 375 company brands and names of private institutions from all over the world, all of them instantly recognizable.

eBay, Western Union and Visa top the rankings of the most frequently used keywords; followed by Amazon, Bank of America, Paypal and the US revenue service. This way, when users search for these names, a link to the malicious website will appear among the first results returned. When they visit these sites, one of two things will happen: either malware will be downloaded onto the user’s computer, with or without their knowledge, or the website spoofs the appearance of a genuine page, a bank say, and users will unwittingly enter their details which will fall into the hands of criminals.

 

(Source: Panda Security)

Full story

Panda Security

Friday, September 10, 2010 5:12:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A booby-trapped e-mail that promises free sex movies is racking up victims around the world, warn security firms. Some variants of the Windows worm contain a link to PDF that a recipient has been told to expect. Those clicking on the link get neither movies nor documents but give the malware access to their entire Outlook address book. When installed, the worm sends copies of itself to every e-mail address it can find.

The malicious e-mail messages have a subject line saying "Here you have" and contain a weblink that looks like it connects to a PDF document. Instead it actually links to a website hosting the malware.

 

(Source: BBC)

Full story

BBC

Friday, September 10, 2010 5:08:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 09, 2010

While social media use has grown dramatically across all age groups, older users have been especially enthusiastic over the past year about embracing new networking tools. Social networking use among internet users ages 50 and older nearly doubled—from 22% in April 2009 to 42% in May 2010.

- Between April 2009 and May 2010, social networking use among internet users ages 50-64 grew by 88%--from 25% to 47%.

- During the same period, use among those ages 65 and older grew 100%--from 13% to 26%.

- By comparison, social networking use among users ages 18-29 grew by 13%—from 76% to 86%.

 

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, September 09, 2010 4:38:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The personal details of thousands of football fans who bought World Cup tickets from official FIFA outlets have been stolen and sold for up to £500,000. Investigators are now trying to establish who purchased the information, which includes the passport details and dates of birth of up to 250,000 supporters, amid concerns it could have fallen into the hands of criminal gangs or even terrorist groups. The massive data breach, which leaves fans open to identity theft and fraud, is now the subject of a criminal investigation. It has been alleged that an employee of one ticketing agency may have been offering the information for sale. The stolen database is understood to have been compiled by FIFA, football’s world governing body, in the run-up to the 2006 World Cup in Germany.

 

(Source: Daily Mail)

Full story

Daily Mail

Thursday, September 09, 2010 4:32:48 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, July 06, 2010

The Safer Internet Forum has been organized by the Safer Internet Programme as an annual conference on safer internet issues since 2004. It brings together representatives of industry, law enforcement authorities, child welfare organizations and policy makers. The past editions of the Safer Internet Forum have welcomed guests not only from Europe, but also from countries such as Australia, Brazil or the Russian Federation.

The 2010 edition of the Safer Internet Forum will take place in Luxembourg on the 21-22 October. This year the Safer Internet Forum will focus on the results of two major research projects funded by the Safer Internet Programme: EUKidsOnline II, which surveyed children and parents in 25 European countries about internet use, and European Online Grooming Project, the first European research project that studies the characteristics and behaviour of sexual offenders who have used the internet to groom young people.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society

Tuesday, July 06, 2010 10:57:02 AM (W. Europe Standard Time, UTC+01:00)  #     | 

A new targeted malware attack is threatening UK bank customers. Security firm Trusteer said that it has spotted a malware attack that compromises user credentials by creating a fake bank log-in page and then uses those credentials to perform an "authorised" monetary transfer. The attack is being spread through multiple infection methods, including web-based exploits and spam email attachments. Rather than aim to infect numerous systems around the world, however, the company said that the attack is specifically targeting the UK and focusing on very few banks at a time, anywhere from three to seven in a single run.

The UK is not the first country to be targeted for such attacks. Trusteer has spotted similar operations in South Africa and Germany.

 

(Source: v3.co.uk)

Full story

v3.co.uk

Tuesday, July 06, 2010 10:05:48 AM (W. Europe Standard Time, UTC+01:00)  #     |