Posts by Sharon Solomon:

iStock_000010131012Small

Justin Bieber Malware Spreading Across The Web

Jan 29, 2014 By Sharon Solomon | We all have different opinions on the Justin Bieber phenomenon, but there is no denying his star-power and influence over the younger generation. The Canadian star is constantly in the headlines for the wrong reasons, including a DUI arrest last week. Interestingly, this event has deeply affected information security worldwide.

</Read More>
iStock_000027071780Small

Botnet Alert: Your Refrigerator May Be Infected

Jan 27, 2014 By Sharon Solomon | The “smart” home appliances we all are letting into our lives are getting “smarter”. This isn’t a movie plot, nor is it a scientific experiment. Security provider Proofpoint estimates that over 750,000 phishing and spam emails have already been sent out by infected fridges, televisions and other appliances.

</Read More>
iStock_000031271006XSmall

Worst Passwords of 2013

Jan 24, 2014 By Sharon Solomon | The results are out. SplashData, a leading password management application provider, has released its annual list of 25 most common passwords found on the net. The list was compiled with the help of data files consisting of millions of stolen passwords, published by leading hackers on the net.

</Read More>
Starbucks

Starbucks iOS App Vulnerability Exposed

Jan 22, 2014 By Sharon Solomon | App security has become a sensitive topic as more and more private information is being shared by users. Even minor vulnerabilities can be exploited and used to harvest sensitive data for criminal or commercial purposes. The latest high-profile loophole was exposed in the Starbucks iOS app.  The vulnerability was found by Daniel E. Wood, a security expert who researches and shares information on the net. His blog post explained the problem with the Starbucks iOS app, which saved user data elements in an insecure way. Thousands of Starbucks customers who use the app to send eGifts or make payments were taken aback with the revelations. The global coffee giant didn’t waste any time and delivered a safer version of the app within days.

</Read More>
iStock_000012980185XSmall

ATMs Robbed With Malicious USB Drives

Jan 20, 2014 By Sharon Solomon | Lovers of the “Terminator” movie series surely remember how John Connor used his cool “binary code gadget” to hack into his local ATM machine. Technology has changed a lot since the early nineties, but hackers are still milking ATMs using malware-loaded USB drives. It’s estimated that millions of dollars have already been stolen in Europe alone. ATMs have always been an object of temptation for criminals and fraudsters. While it has become very difficult to physically vandalize and carry away these machines, tampering with their parameters is quite a simple task.

</Read More>
iStock_000016399323XSmall

Cloned Minecraft for Android Doing the Rounds

Jan 17, 2014 By Sharon Solomon | The underground Android application market is booming. More and more pirated games are available for direct download on the net. One such game, the cloned Minecraft PE, is causing extensive damage all across the globe. Users of the Trojanized version are advised to uninstall the game immediately. The temptation is irresistible for any hardcore gamer. When costly games are available at a discount or even for free, downloading via the black-market becomes a no-brainer for many. But what is often forgotten is that mobile security is seriously compromised. The aforementioned Trojanized version of Minecraft PE, which is still available in various Russian pirate app stores, is a huge security risk. Available for 2.50 Euros, this cloned version infiltrates the system and exploits the victims’ cell phones.

</Read More>
iStock_000019605693XSmall1

Malware Alert: Flashback Trojan Still Alive And Kicking

Jan 16, 2014 By Sharon Solomon | Apple’s Mac OS is considered to be safer than other leading computing platforms. But this reputation was serious dented back in 2011 when the Flashback Trojan was exposed. More than 500,000 Mac users were affected by the malware within months. The bad news is that the Flashback is still active.

</Read More>
iStock_000019354781XSmall

Cryptolocker – Nasty Ransomware Wrecking Havoc Worldwide

Jan 13, 2014 By Sharon Solomon | If you own a PC running Windows, you are vulnerable to Cryptolocker. This Trojan entered the spotlight in late 2013 and is not showing any signs of slowing down. It’s very important to understand and be aware of this fast-spreading ransomware, which has already earned its operators lots of money. The dreaded Trojan initially spread only via emails. Users were sent malicious emails with downloadable files or misleading links. The exploited computer’s data files were then locked until a ransom was paid for the decryption. The news keeps getting worse. Cryptolocker is now capable of contaminating computers with removable USB drives and pirate software activators. Windows users should refrain from using unknown USB drives and must install only official software.

</Read More>
iStock_000019779066XSmall

Facebook Sued For Alleged Privacy Theft

Jan 10, 2014 By Sharon Solomon | Facebook has apparently crossed the line again. Two users have sued the social media giant for allegedly eavesdropping on private chats for commercial purposes. The complaint was filed in a San Jose federal court. Facebook legal representatives have denied the charges and claimed that there is no truth to their allegations. Facebook has been accused of violating the Electronic Communications Privacy Act and also not respecting California’s privacy and unfair competition laws. This is not the first time Facebook has been accused of privacy theft and snooping for financial profit.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.