The malware infected "potentially tens of thousands" of computers, spying on the users and attacking Internet sites that contained messages of political dissent.
Articles by Kara Reeder
Hackers could steal meters and reprogram them or wirelessly hack the meter from a laptop.
The malware infects Windows computers and disguises itself as an updater for Adobe Systems' products and other software.
Computerworld reports that according to Steven Chabinsky, deputy assistant director in the FBI's cyber division, criminal hacker organizations are increasingly operating like corporations, staffed by experts with specific jobs. Chabinsky says:The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services.The top 10 positions in cyber criminal organizations, according to Chabinsky, are: Coders/programmers -- write exploits and malwareDistributors -- trade and sell stolen dataTech experts -- maintain IT infrastructureHackers -- search for and exploit applicationsFraudsters -- create and deploy various schemesHosted systems providers -- provide safe hosting of illicit content servers and sitesCashiers -- control drop accountsMoney Mules -- complete wire transfersTellers -- transfer and launder illicitly gained proceedsOrganized leaders -- assemble the team and choose the targets
The State Department and Capitol Hill have issued proposals to establish an ambassador-level cybersecurity post.
The bug affects Firefox 3.6.
Charlie Miller will not reveal details of the vulnerabilities, but will show how he found them.
Microsoft's Internet Explorer 8, not Apple's Safari, will be the first browser to go.
Troyak has been fighting hard to find other ISPs to carry its traffic on the Internet.
Facebook is "aggressively disabling" the apps.
According to Gartner, 60 percent of virtual servers are less secure than physical servers.
In 2009, the total number of complaints were up 22.3 percent from the previous year.
A security update for Excel spreadsheet has turned English text in the "Add or Remove Programs" tool into Chinese.
Beckstrom said stronger efforts are needed to protect the DNS.
The ISPs were responsible for a third of the Zeus command-and-control servers.
LifeLock will pay $11 million to the FTC and $1 million to the states.
Almost all of reported incidents "related to malware on online banking customers' PCs."
The Westin Bonaventure Hotel & Suites' point-of-sale system may have been hacked.
Experts warn that if attackers are able to change source code, they might add back-doors or logic bombs in the software they gain access to.
The idea has ruffled the feathers of many in the computer world who believe Microsoft is the reason for countless, worldwide cyber security problems.
The decision to lift the veil of secrecy on CNCI was made as part of the administration's commitment to open government and transparency.
The company has employed a small army of workers to piece together what happened.
Microsoft is looking to try the same approach for other botnets.