West Nile this Year claims First Human Victim


The only case of West Nile virus afflicted a man above 60 years of age as reported by the La Salle County Health Department. The elderly gentleman fell ill sometime last month. Similar cases of...

MERS Virus: Egypt Reports First Case of MERS virus


MERS virus now hits Egypt after Saudi Arabia. Egypt's Ministry of Health announced on Saturday that a 27 years old patient is being treated for pneumonia at a Cairo hospital. He is an Egyptian...

France SARS vials go missing by the thousands


France has a big problem that could see untold numbers of people become ill. Reports indicate that thousands of vials of the contagious respiratory disease SARS have gone missing form a high-security...

Windows XP Owners to Face Security Risks


Cyber-hackers will be in a feeding frenzy once the April 8th date is reached. For that is the exact time when the security and protection of Windows XP goes out the window (pun intended). The fact...

Norovirus Outbreak Leads to Return of Cruise Liner


The Caribbean Princess, a cruise ship is returning to its original port of departure, Texas after a curtailed journey. The outbreak of the notorious norovirus led to a plague of gastrointestinal...

Plush Computer Viruses

plush viruses Plush Computer Viruses
Here are computer viruses that you’ll actually want to get! These Computer Virus Dolls each have a pop-up, just like you get when you have a real virus. Except it’s a pop-up tag. Each doll has it’s name geekily spelled out in binary on it’s sewn-in tag. Currently they are available in Malware, Worm, Trojan, and Virus, with more to be released soon. Give your co-workers a virus- it’s ok.

Plush Computer Viruses

Norovirus Yellowstone Outbreak


Yellowstone National Park has just seen an epidemic arise in its midst. This happens to be one of the most common causes of gastrointestinal illness in North America. Termed the Norovirus, NPS states...

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare

Kaspersky Labs preps its own OS to guard industry against cyberwarfare

Kaspersky Labs' namesake Eugene Kaspersky is worried that widely distributed and potentially state-sponsored malware like Flame and Stuxnet pose dire threats to often lightly protected infrastructure like communication and power plants -- whatever your nationality, it's clearly bad for the civilian population of a given country to suffer even collateral damage from cyberattacks. To minimize future chaos and literally keep the trains running, Kaspersky and his company are expanding their ambitions beyond mere antivirus software to build their own, extra-secure operating system just for large-scale industry. The platform depends on a custom, minimalist core that refuses to run any software that isn't baked in and has no code outside of its main purposes: there'll be no water supply shutdowns after the night watch plays Solitaire from an infected drive. Any information shared from one of these systems should be completely trustworthy, Kaspersky says. He doesn't have details as to when the OS will reach behind-the-scenes hardware, but he stresses that this is definitely not an open-source project: some parts of the OS will always remain confidential to keep ne'er-do-well terrorists (and governments) from undermining the technology we often take for granted.

Filed under:

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare originally appeared on Engadget on Tue, 16 Oct 2012 13:28:00 EDT. Please see our terms for use of feeds.

Permalink The Next Web  |  sourceEugene Kaspersky, Securelist  | Email this | Comments

White House announces anti-botnet initiative

White House announces anti-botnet initiative

The White House has been drumming up momentum for tighter internet privacy laws for a while now, and today it's furthering that online safety agenda with a new initiative for combating botnets. Washington just announced a pilot program for fighting viruses, citing a whopping five million PCs infected worldwide this year. The program will use principles outlined by the Industry Botnet Group, with the main goal being to educate internet users on the dangers of cyberspace while preventing botnets from spreading by sharing data about infected computers. The White House is working with the Information Sharing and Analysis Center to develop and implement the "botnet pilot," presumably to enact those anti-virus principles.

White House announces anti-botnet initiative originally appeared on Engadget on Wed, 30 May 2012 22:51:00 EDT. Please see our terms for use of feeds.

Permalink Bloomberg  |   | Email this | Comments

Exploit uses firewalls to hijack smartphones, turns friends into foes

Image

Normally, firewalls at cellular carriers are your best friends, screening out malware before it ever touches your phone. University of Michigan computer science researchers have found that those first lines of defense could be your enemy through a new exploit. As long as a small piece of malware sits on a device, that handset can infer TCP data packet sequence numbers coming from the firewall and hijack a phone's internet traffic with phishing sites, fake messages or other rogue code. The trick works on at least 48 carriers that use firewalls from Check Point, Cisco, Juniper and other networking heavy hitters -- AT&T being one of those providers. Carriers can turn the sequences off, although there are consequences to that as well. The only surefire solution is to either run antivirus apps if you're on a mobile OS like Android or else to run a platform that doesn't allow running unsigned apps at all, like iOS or Windows Phone. Whether or not the exploit is a serious threat is still far from certain, but we'll get a better sense of the risk on May 22nd, when Z. Morley Mao and Zhiyun Qian step up to the podium at an IEEE security symposium and deliver their findings.

Exploit uses firewalls to hijack smartphones, turns friends into foes originally appeared on Engadget on Tue, 22 May 2012 03:18:00 EDT. Please see our terms for use of feeds.

Permalink Ars Technica  |  sourceUniversity of Michigan (PDF)  | Email this | Comments