Articles by Kara Reeder 

Google Claims Malware Targets Vietnamese Activists

The malware infected "potentially tens of thousands" of computers, spying on the users and attacking Internet sites that contained messages of political dissent.

Vulnerabilities Found in Smart Meters

Hackers could steal meters and reprogram them or wirelessly hack the meter from a laptop.

New Malware Targets Software Updaters

The malware infects Windows computers and disguises itself as an updater for Adobe Systems' products and other software.

Top 10 Posts in Cyber Criminal Organizations, According to the FBI

Computerworld reports that according to Steven Chabinsky, deputy assistant director in the FBI's cyber division, criminal hacker organizations are increasingly operating like corporations, staffed by experts with specific jobs. Chabinsky says:The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services.The top 10 positions in cyber criminal organizations, according to Chabinsky, are: Coders/programmers -- write exploits and malwareDistributors -- trade and sell stolen dataTech experts -- maintain IT infrastructureHackers -- search for and exploit applicationsFraudsters -- create and deploy various schemesHosted systems providers -- provide safe hosting of illicit content servers and sitesCashiers -- control drop accountsMoney Mules -- complete wire transfersTellers -- transfer and launder illicitly gained proceedsOrganized leaders -- assemble the team and choose the targets 

U.S. Proposes Post to Combat Cyber Crime Oversees

The State Department and Capitol Hill have issued proposals to establish an ambassador-level cybersecurity post.

Critical Firefox Bug Confirmed by Mozilla

The bug affects Firefox 3.6.

Security Expert to Disclose 20 Holes in Mac OS X

Charlie Miller will not reveal details of the vulnerabilities, but will show how he found them.

Pwn2Own Organizer Predicts IE8, iPhone First to Fall

Microsoft's Internet Explorer 8, not Apple's Safari, will be the first browser to go.

Troyak Struggling for Life

Troyak has been fighting hard to find other ISPs to carry its traffic on the Internet.

Facebook Warns About Stalk-My-Profile Scam

Facebook is "aggressively disabling" the apps.

Virtual Machines Less Secure Than Physical Machines, Says Gartner

According to Gartner, 60 percent of virtual servers are less secure than physical servers.

Cyber Fraud Losses Doubled in 2009, Says FBI

In 2009, the total number of complaints were up 22.3 percent from the previous year.

Microsoft Confirms Office Patch Gaffes

A security update for Excel spreadsheet has turned English text in the "Add or Remove Programs" tool into Chinese.

ICANN's Beckstrom Criticized for DNS Security Remarks

Beckstrom said stronger efforts are needed to protect the DNS.

Zeus Dealt Blow After Two ISPs Knocked Out

The ISPs were responsible for a third of the Zeus command-and-control servers.

LifeLock Reaches $12 Million Settlement with FTC, States

LifeLock will pay $11 million to the FTC and $1 million to the states.

FDIC: Hackers Rake in More Than $120 Million in Three Months

Almost all of reported incidents "related to malware on online banking customers' PCs."

LA Hotel Reports Possible Data Breach

The Westin Bonaventure Hotel & Suites' point-of-sale system may have been hacked.

FBI: Valuable Data Corrupted

Experts warn that if attackers are able to change source code, they might add back-doors or logic bombs in the software they gain access to.

Microsoft's Internet Tax Riles Computer World

The idea has ruffled the feathers of many in the computer world who believe Microsoft is the reason for countless, worldwide cyber security problems.

White House Declassifies Cyber Security Plan

The decision to lift the veil of secrecy on CNCI was made as part of the administration's commitment to open government and transparency.

BlueCross Faces Notification Nightmare Following Hard Drive Theft

The company has employed a small army of workers to piece together what happened.

Microsoft Looking to Target Other Botnets with Legal Action

Microsoft is looking to try the same approach for other botnets.

Get the Latest Scoop with Networking Update Newsletter