{"id":77178,"date":"2013-11-16T17:54:12","date_gmt":"2013-11-16T12:24:12","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=77178"},"modified":"2013-11-16T17:54:12","modified_gmt":"2013-11-16T12:24:12","slug":"this-weeks-latest-it-security-news-and-alerts","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/this-weeks-latest-it-security-news-and-alerts\/","title":{"rendered":"This Week&#8217;s Latest IT Security News and Alerts"},"content":{"rendered":"<p><b>Businesses Should Gear up for Worse Cyber Attacks in 2014<br \/>\n<\/b>Cyber predictions for the coming year may not be pleasant for businesses. Security analysts are predicting that 2014 will see nastier cyber attacks on enterprises. Malware artists may use more of targeted attacks. Incidences of data breach may increase and ransomware attacks may be more frequent especially on small and medium enterprises. Java also remains a high risk zone where zero-day exploits may be increasingly used to target company networks. [source:timesofindia.com].<\/p>\n<p><b>Data Hungry Governments are Getting Hungrier \u2013 Google said<br \/>\n<\/b>In its latest transparency report, Google seemed to have spilled some more beans about the government. Most of us are aware by now that governments and law and enforcement bodies have been requesting Google for user data. In this report, Google stated that such requests have doubled since 2010. And the most number of requests were spewed by the U.S. Speaking of India, in 2013, it made the second largest number of requests. In this <a href=\"https:\/\/www.google.com\/transparencyreport\/userdatarequests\/US\/\" target=\"_blank\">report<\/a> you will find information of the requests for user data, made by the government of several countries.<\/p>\n<p><b>D-Link Router found to be Infected with New Security Holes<br \/>\n<\/b>New security vulnerabilities have been discovered in the D-Link 2760 N. \u00a0It is reported that, the router is infected with cross-site scripting bugs. Cross-site scripting refers to a security hole found in Web applications. This security flaw can allow a hacker to inject malicious content into Web pages visited by users. This type of vulnerability accounts for 84% of all security vulnerabilities. [source:news.cnet.com]<\/p>\n<p><b>Forums of MacRumors Hacked \u2013 User Data Exposed<br \/>\n<\/b>The data of over 860,000 users got compromised when the forums of MacRumors were hacked. The data included email addresses, usernames, and hashed passwords. Reportedly, the hackers used a moderator\u2019s account to hack into the user database of the forums. It seems that the hackers themselves have posted about the breach on <a href=\"https:\/\/www.macrumors.com\/2013\/11\/12\/macrumors-forums-security-leak\/\" target=\"_blank\">MacRumors<\/a> forums. A part of their post stated that they do not intend to leak any of the stolen information, nor use the same to hack into user accounts. Users are advised to changed their passwords if they have an account in these forums, and not to use the same password for multiple accounts. You can read the entire message by the source claiming to be the hacker <a href=\"https:\/\/forums.macrumors.com\/showpost.php?p=18355633&amp;postcount=518\" target=\"_blank\">here<\/a>.<\/p>\n<p><b>Russian Nuclear Plant infected with the Stuxnet Virus<br \/>\n<\/b>Stuxnet is known as the most sophisticated worm ever created. If you think that malicious programs can be unpredictable and can go crazy, then this news might cement your believe. The Stuxnet worm has gone out of control and infected a nuclear plant in Russia. The worm was designed by U.S. and Israeli programmersto target Iran\u2019s nuclear facilities in 2010. Some sources have even reported that the worm has reached the International Space Station (ISS). While this is not true, the ISS is still vulnerable to malware attacks. [source:news.discovery.com]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses Should Gear up for Worse Cyber Attacks in 2014 Cyber predictions for the coming year may not be pleasant for businesses. Security analysts are predicting that 2014 will see nastier cyber attacks on enterprises. Malware artists may use more of targeted attacks. Incidences of data breach may increase and ransomware attacks may be more [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[745,506,746,91,634,575,747,748],"class_list":["post-77178","post","type-post","status-publish","format-standard","hentry","category-news","tag-d-link-router","tag-hack","tag-macrumors","tag-password","tag-security-hole","tag-surveillance","tag-transparency-report","tag-warrants"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77178"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=77178"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77178\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=77178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=77178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=77178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}