{"id":75902,"date":"2013-06-01T16:33:28","date_gmt":"2013-06-01T11:03:28","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=75902"},"modified":"2013-06-01T16:33:28","modified_gmt":"2013-06-01T11:03:28","slug":"security-news-and-updates-for-this-week","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/security-news-and-updates-for-this-week\/","title":{"rendered":"Security News and Updates for this Week"},"content":{"rendered":"<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\">Let&#8217;s catch up on some important news and updates related to IT security.<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><b>Guess What&#8217;s New on the Platter of Chinese Hackers? &#8211; U.S. Weapon Designs<br \/>\n<\/b>Looks like <\/span><\/span><span style=\"font-family: Calibri,sans-serif;\"><a href=\"https:\/\/www.businessinsider.com\/china-hacked-us-military-weapons-systems-2013-5\" target=\"_blank\">Chinese hackers<\/a> are leaving no stone unturned; reportedly, they hacked their way into the designs of more than 2 dozen weapons of the United States. No identification of the hackers have yet been established. The designs that were compromised include data regarding combat aircraft and ships, and missile defences as well. A senior official said, such data equals 25 years of research and development that the Chinese government would require to invest for its combat abilities.<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><b>Thanks to Motorola, You Can Now Become Your Own Password!<br \/>\n<\/b>Motorola, the company that launched the first hand-held mobile phone, is working on a new project that can be perceived as no less than a &#8220;science fiction&#8221; by many. The company is planning to come up with an electronic tattoo and an ingestible pill (approved by the Food and Drug Administration) that can make a person&#8217;s body to transmit passwords, and unlock their computer, cell phone, car, etc. Read the complete report <a href=\"https:\/\/abcnews.go.com\/blogs\/technology\/2013\/05\/sick-of-typing-passwords-get-an-electronic-tattoo-or-ingest-a-pill\/\" target=\"_blank\">here<\/a>.<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><b>Indian Government Shows Interest in Home-Grown Security Solutions<br \/>\n<\/b>The National Security Council recently hosted a <\/span><\/span><span style=\"font-family: Calibri,sans-serif;\">meeting that was attended by officials from top security firms of the country. The officials expressed their concern about leaving the safe-keeping of the country&#8217;s critical information in the hands of foreign-made security software. According to them, India should become self-sufficient in terms of protecting its own assets, and for that <\/span><\/span><span style=\"font-family: Calibri,sans-serif;\"><a href=\"https:\/\/timesofindia.indiatimes.com\/tech\/enterprise-it\/security\/Cybersecurity-Government-wants-more-Indian-software\/articleshow\/20287071.cms\" target=\"_blank\">home-grown security solutions<\/a> must be given more preference. Seems like, it&#8217;s about time Indian-made security firms showed what they have up their sleeve.<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><strong>Malware Can Be Activated by Light and Sound<\/strong><br \/>\n<\/span><\/span><span style=\"font-family: Calibri,sans-serif;\">Researchers at the University of Alabama at Birmingham (UAB) have come up with a <\/span><\/span><span style=\"font-family: Calibri,sans-serif;\"><a href=\"https:\/\/www.scmagazine.com\/researchers-prove-that-light-sound-can-activate-mobile-malware\/article\/295574\/\" target=\"_blank\">study <\/a>that shows that, smartphones infected with malware can be \u201ccontrolled\u201d by an attacker, simply by the means of light, sound or vibrations. It may sound unrealistic, but because of the rich variety of sensors built in today&#8217;s mobile phones, such malware attacks are possible. For instance, an attacker could use the music from a speaker to instruct the malware in your phone to carry out malicious activities.<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><b>Skpe and IM Users Be Wary of the <\/b><\/span><\/span><span style=\"color: #333333;\"><span style=\"font-family: Calibri,sans-serif;\"><b>Liftoh Trojan<br \/>\n<\/b><\/span><\/span><\/span><span style=\"color: #333333;\"><span style=\"font-family: Calibri,sans-serif;\">If you are into Skype or other Instant Messaging services, then hold your horses before clicking on shortened URLs that you may receive as a message. Be wary of such URLs even if they appear to have come from a fellow Skyper. Reportedly, users in Latin America, who clicked on these URLs, got redirected to a malicious website and their systems got compromised by a new Trojan called <\/span><\/span><\/span><span style=\"color: #333333;\"><span style=\"font-family: Calibri,sans-serif;\"><a href=\"https:\/\/www.scmagazine.com\/attackers-use-skype-other-im-apps-to-spread-liftoh-trojan\/article\/294860\/\" target=\"_blank\">Liftoh<\/a>.<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s catch up on some important news and updates related to IT security. Guess What&#8217;s New on the Platter of Chinese Hackers? &#8211; U.S. Weapon Designs Looks like Chinese hackers are leaving no stone unturned; reportedly, they hacked their way into the designs of more than 2 dozen weapons of the United States. No identification [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[344,345,346,347,348,349],"class_list":["post-75902","post","type-post","status-publish","format-standard","hentry","category-news","tag-china","tag-hackers","tag-liftoh","tag-malware-activated-by-light-and-sound","tag-motorola","tag-national-security-council"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75902"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=75902"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75902\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=75902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=75902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=75902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}