Avoiding Dodgy Web Sites No Longer Works To Stay Safe
If in the past your way to stay safe on the Web was to not visit dodgy sites like gambling, porn, piracy or other "unsafe district" locations, that strategy no longer works. Google ...
Covering the latest malware threats affecting software, hardware, cloud networks, etc. Keeping you informed so you can keep your users safe.
If in the past your way to stay safe on the Web was to not visit dodgy sites like gambling, porn, piracy or other "unsafe district" locations, that strategy no longer works. Google ...
It was all over the news. The Citadel botnet responsible for stealing more than 500 million dollars out of bank accounts from both individuals and organizations worldwide has been largely ...
Chelan County Treasurer David Griffiths says Leavenworth's hospital district stands to recover less than half the $1 million stolen in an online banking theft. About $415,000 has been ...
Symantec just released a white paper where they compared their product with 6 other enterprise endpoint security products. They had AV-Test do the review, and they included above graph to ...
You may have read CyberheistNews Vol 3, #19, which had 'Fraud-as-a-service Goes Mainstream' as its headline. Here is a follow up on that. You can now download apps that hack Facebook, and ...
The Research Team of Panda Labs just reported that between January and March of this year, more than 6.5 million new malware strains were built, and that of those 75% were trojans. In ...
So, yesterday I received this email from my Identity Theft Provider. Been with them since 2008 so I know how their emails look. Normally I get the "all clear" signal once a month, but ...
Automated Twitter DM Spear Phishing. It was to be expected. Cyber criminals now are able to scrape your followers from Twitter, and send you a Direct Message (DM) supposedly coming from ...
I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...
Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...
The San Mateo, California based security firm AlienVault created a very interesting infographic that they called “The eternal life of malware.” because the malware gets recycled and ...
Antony Savvas at Computerworld UK had a good write-up about this quite interesting news: "Some 91% of cyberattacks begin with a "spear phishing" email, according to research from security ...
NBC News reported: COLUMBIA, S.C. -- A single malicious email sent to workers at the South Carolina Department of Revenue last August enabled an international hacker to crack into state ...
Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...
[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...
[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...
[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...