After reading this we are recommending that anyone with a Netgear router/firewall product checks the following URL:
If this comes up with an authentication request then there is no need for concern – HOWEVER if this does present a page to you then we STRONGLY recommend turning off Remote administration of the router until Netgear issues an update – or getting a new (non Netgear) router/firewall.
Vulnerabilities in some Netgear router and NAS products open door to remote attacks – Techworld.com.
The Cryptolocker ransomware is still going strong. In essence, once your computer has been infected it encrypts all of your “document” files based on file extension and then gives the user 72 hours to pay the ransom ($300 USD or 2 BTC). It will encrypt not only the local files but also any files stored on shared drives – which makes it critical that you are protected. It is one of the few pieces of ransomware that does encryption *correctly* so at present, short of paying the ransom, there is no other means to decrypt. Bleeping Computer has a good write up of the virus and what to do:
CryptoLocker Ransomware Information Guide and FAQ.
Kdms Team hackers hijack Rapid7 website using faxed DNS change request | Techworld.com.
You are quite literally only as secure as the weakest part of the security chain. In this case a Faxed DNS change request was acted on with no confirmation of the authority to proceed.
Backdoor found in D-Link router firmware code
via Backdoor found in D-Link router firmware code | Techworld.com.
I would recommend that you disable remote management on any of the following DLink devices:
Vulnerability in Internet Explorer Could Allow Remote Code Execution
via Microsoft Security Advisory (2887505): Vulnerability in Internet Explorer Could Allow Remote Code Execution.
Affects IE8, IE9 on all platforms.