A security researcher at Palo Alto Networks has discovered a vulnerability in the Android operating system that makes it possible for hackers to slip malware in masquerading as a legitimate application. While Google has released patches to correct the problem, the flaw is still thought to affect nearly 50% of Android devices, Zhi Xu says.
Financial regulators need to pay closer attention to potential threats such as cyberattacks on financial institutions, says Federal Reserve Bank of Atlanta President Dennis Lockhart. There is the potential for widespread financial-sector disruption due to attacks by "sophisticated, well-organized hacking groups," Lockhart warns.
An Asian e-commerce company is recovering from what experts are calling the largest distributed-denial-of-service attack of 2011, a weeklong barrage that used botnets to deliver disruptive data. The unidentified target was hit with four waves of traffic from more than 250,000 infected computers, many of them in China, that swamped its networks with 15,000 connections per second, according to Prolexic.
New technologies are emerging that are designed to give enterprises a grasp on the surging amount of information leaving their offices via social-networking sites such as Facebook and Twitter. Since employee posts are considered company communication, experts say keeping tabs on what's being said and where could be crucial to future litigation. "It is a sensitive topic, and in the context of a corporation protecting its assets and protecting its intellectual property, it's a touchy debate," said Dan Romine, president and CEO of SocialLogix.
Attacks by Chinese hackers on Google have highlighted the perils of "Trojan horse" infiltration of companies' source codes. If hackers can make undetected changes to code, they could spy on a widespread and ongoing basis. Hacking a Cisco router, for example, "could provide the perfect over-the-shoulder view of everything coming out of a network," says Jeff Moss, a security expert on the Homeland Security Advisory Council.