[caption id="" align="alignleft" width="260" caption="Norton Protects Against Flame?"][/caption] The antivirus industry is making hay with the new Flame malware, but Symantec marketing is ...
Hackers will find any mail server that is not protected and/or configured correctly and use it to send out as much spam as possible. This gets the unsuspecting organization blacklisted ...
Ed Bott wrote a truly excellent article over at ZDNet where he describes the history of Windows Malware, which shows on the very first slide that most malware is installed via social ...
Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...
Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: "Tucked away in a small town outside Moscow, Russia one of ...
This is a discussion on Reddit, where a (presumably Polish) malware coder and botnet operator very candidly answers questions from people. This is a fascinating but rather technical read, ...
The Internet Crime Complaint Center had this 'Intelligence Note': "Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers ...
Fresh from Yahoo News by Steve Weizman: "Interpol president Khoo Boon Hui said on Tuesday that organised international gangs are behind most internet scams and that cyber crime's ...
WIRED Mag has a great article by Kim Zetter. It boils down to the fact that high-level hackers are able to get and stay in your network. And even if you are able to kick them out, they ...
I just got a 'perk' over at the Klout site, which gives you a score how you do in Social Media. The perk was 50 business cards, each with a different backside if you want to. The company ...
Tracy Kitten over at BankInfoSecurity spotted something interesting in Symantec's recent Internet Security Threat Report. This is the upshot: "Which Internet security threats pose the ...
Kelly Jackson Higgins over at Dark Reading had a very interesting article: "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business ...
We have seen crooked Walmart gift card offers before, but now and then I run across one that's craftier than earlier versions. And as usual, you do not get the gift card, but a high dose ...
The SANS Computer Forensics and Incident Response team built a real-life network for their students so they could learn how to hack into the network. They put McAfee enterprise endpoint ...
CyberheistNews Vol 2, #20 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Warn Your Users: NY Traffic Ticket Phish This phish is a ...
Symantec contributor Fred Gutierrez shows clearly in this blog post why it can be deadly to click on a .JPG file: "Cybercriminals have continuously evolved their methods throughout the ...
Matthew Hansen, World-Herald Staff Writer just wrote a great article that illustrates what I have been warning about these last years. It starts out like this: "Imagine for a moment that ...
Chris Boyd over at GFI wrote: "If we survive the Mayan Apocalypse of 2012, does that mean were technically immortals? Ive no idea, but it will probably mean we dont see quite as many ...