Users are the weakest link in IT
Some excellent work by our colleagues at Trend Micro. They see that users are the weakest link in IT! [caption id="" align="alignleft" width="550" caption="Weakest Link in IT"][/caption]
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Some excellent work by our colleagues at Trend Micro. They see that users are the weakest link in IT! [caption id="" align="alignleft" width="550" caption="Weakest Link in IT"][/caption]
Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...
[caption id="" align="alignleft" width="361" caption="Malware Unique Samples"][/caption] Malware is still exploding. Check out this graph. During the last few years, the security industry ...
You have probably heard about how Microsoft, the US Marshals together with some other organizations killed some some Zeus botnets. Microsoft's PR crew released a video about the operation ...
Holland's capital The Hague will get a new international showpiece. The new European Centre for Cybercrime will start there early 2013. European Commissioner for Home Affairs Cecilia ...
I wrote a new article that is also available in the resources section on our website: More and more, the bad guys are bypassing your firewall, endpoint protection and other ...
Anne Fisher, Editor of New York's Executive Inbox wrote: "Can you recognize a potentially disastrous breach of your computer systems security when you see it? Lets find out with two ...
Wow, instead of an exploit dropping a file onto the file system and running it... a DLL is injected straight into memory from the exploit, leaving nothing to scan on the harddrive. Writen ...
CyberheistNews Vol 2, #7 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Facebook Malware Scam Of The Week A "worrying number" of ...
Richard Stiennon at Forbes has a very good point. "My oft repeated advice for technology vendors is that security sells. Given a choice between two vendors of similar products or services ...
The Cridex malware trojan hides in fake LinkedIn invitations. Take care with those invites! GFI Labs recently discovered a LinkedIn email phishing scam that installs a banking trojan. It ...
Members of the largest criminal group engaged in online banking fraud are detained March 20, 2012 MOSCOW Group-IB, the first Russian company providing comprehensive investigation of IT ...
CyberheistNews Vol 2, #6 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Facebook Malware Scam Of The Week A "worrying number" of ...