National Computer Emergency Response Team has been established in Kazakhstan (KZ-CERT):
- monitoring and detection of internet resources violationg law of the Republic of Kazakhstan;
- elaboration of propositions and recommendations on guarding the interests of person, society and state in information space;
- provide information security consulting services;
- fast and thorough gathering of information about cyber attacks or other suspicious activities.
- coordination of public and telecommunication operators’ cyber security units and other actors of national information infrastructure in the issues regarding prevention of violations in information and communication technologies;
- collection, analysis and storing information concerning existing threats to cybersecurity and effectiveness of implemented security measures
23 May 2013
F-Secure Experts Explored New Virus for Mac
In an Oslo Freedom Forum workshop offering advice to free speech advocates on how to better secure their devices against government surveillance, security researcher Jacob Appelbaum uncovered a new strain of malware with backdoor capabilities on the Mac machine of an Angolan activist attending the event.
The malware signed by legitimate AppleID which has been released to one of the developers, periodically makes a screenshots and then transmit them to MacApp folder. According to...
23 May 2013
DDoS Attacks Become the Mean of Viruses Distribution
According to experts, companies first need to be able to isolate the attacked components.
After analyzing large DDoS-attacks , which earlier this year underwent many media, as well as a series of attacks on the financial structure of the United States, the responsibility for which has taken over the hacking group Cyber Fighters of Izz ad-din Al Qassam, the experts found that, together with holding major attacks, cyber criminals send out spam messages in some malware.
20 May 2013
New honeypot detects hackers attacking SCADA-systems
IT-expert Lukas Rist designed honeypot for hackers who attack objects of important infrastructure system.
Conpot allows cybercriminals to calculate that scan the IP-addresses of SCADA-systems, and then keep track of their activities. The lure mimics the system Siemens SIMATIC S7-200, which connects to the Internet via an I / O CP 443-1. Conpot supports two network protocols Modbus and SNMP, which are commonly used SCADA-systems.
According to the developers, Conpot is also compatible...