Topic: Networking

Facebook to fill your news feed with video adverts

You may start seeing video-based advertisements in your Facebook news feed soon -- as the social network begins to sell video advert space to vendors. According to the Wall Street Journal, sources "familiar with the matter" say that the social networking giant will begin selling video-based advertisements this week as it taps into revenue usually spent by firms on broadcasting and television adverts. Facebook's news feed -- on browsers and mobile -- will be the destination of these ads on Thursday, and the social network is expected to announce the change today.

How Computer Viruses Can Go Airborne

According to two German scientists, new computer viruses can infect other computers within 60 feet simply by emitting high-frequency sounds. One day Dragos Ruiu noticed that his MacBook Air was behaving like it had a virus. According to Hanspach and Goetz this transmission can take place over a considerable distance: up to 64 feet if both systems are infected.

Chinese hackers spied on Europe before G20 Summit, researchers say

Once opened, the emails provided the channel for malicious code to be loaded on to the computers -- which became the conduit for the Chinese hackers to spy on ministry activity. However, FireEye lost its link to the hackers once they shifted their activities to a different server just before the G20 Summit took place in Russia. The firm said it believes the hackers moved the command center as they began preparations to steal data from the compromised systems.

Cybersecurity in 2014: A roundup of predictions

One of the many signs that the year is drawing to a close is the appearance of predictions for the coming 12 months by security vendors and analysts. Sophisticated threat actors will continue to hide behind traditional mass-market crimeware tools to make identification and attribution hard for network defenders More attack binaries will use stolen or valid code signatures Mobile malware will further complicate the threat landscape Java zero-day exploits may be less prevalent Browser-based vulnerabilities may be more common Malware authors will adopt stealthier techniques for command-and-control (CnC) communications Watering-hole attacks and social media targeting will increasingly supplant spear-phishing emails More malware will fill the supply chain. More details on FireEye's 2014 predictions.

Executive's guide to IT security and risk management (free ebook)

With the explosion of mobile device usage, public cloud services, and social networking — along with emerging technologies such as those built around machine-driven intelligence — the digital world is changing at a breakneck pace. Attack surfaces keep expanding, cybercriminals keep developing new tricks (and new ways to use old tricks), and security professionals are facing a barrage of threats that have outgrown traditional solutions. In a year of high-profile breaches, revelations about the NSA's surveillance practices, and heightened concerns about information privacy, malicious damage, and massive data theft, IT leaders are turning to next-generation tools and strategies to address the latest breed of multifaceted attacks.