A senior official told the Washington Post that there had been “activity of concern” but that none of the department’s classified systems had been compromised. more..IT Governance
The organisers said, “8 year old Reuben Paul gives keynote at Houston Security Conference.” more…NDTV
Billion-dollar investor Warren Buffett is rumored to be preparing for a crash as well. The “Warren Buffett Indicator,” also known as the “Total Market Cap to GDP Ratio,” is breaching sell-alert status and a collapse may happen at any moment. more…Money News
“With just a mobile phone we created a PoS terminal that could read a card through a wallet,” explained Martin Emms, the project leader. “All the checks are carried out on the card rather than the terminal so at the point of transaction, there is nothing to raise suspicions. By pre-setting the amount you want to transfer, you can bump your mobile against someone’s pocket or swipe your phone over a wallet left on a table and approve a transaction. In our tests, it took less than a second for the transaction to be approved.” – more…Security Affairs
Once the malware is installed on the system, it can perform a wide range of tasks with administrator privileges, on the operating system level. For example, an attacker can execute OS commands that allow him to install other malware, steal data from the victim’s browsing session, or gain complete control over the targeted device. An attacker can also execute malicious OS scripts, and exploit vulnerabilities in other software installed on the compromised machine. more …HackingInsight
The manual explains how to avoid surveillance of the Intelligence agencies, the document highlights how to prevent exposing location and/or key data using the popular social network Twitter – more…. Security Affairs
AirHopper is a special type of keylogger because it uses radio frequencies to transmit data from a computer, all by exploiting the computer’s monitor display, in order to evade air-gap security measures.
“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” according to a release by Ben Gurion University. – more @HackInsight
Makaseh Identity does away with userid’s and passwords and does more to authenticate a general user from a trusted site or guest.