Please turn on your JavaScript for this page to function normally.
How cybercriminals profit from money laundering through gambling sites

A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30% over the …

NetSupport vulnerabilty allows information leakage

NetSupport is an application that allows corporations to remotely manage and connect to PCs and servers from a central location, to provide desktop support. I wrote a script …

Hands on fun at HacKid 2014

Last weekend, families and tech industry leaders descended on The Tech Museum of innovation in San Jose, California, for HacKid 2014. We had a great turnout for the event …

Researchers spot SMS Trojan active in the US

For the first time ever, Kaspersky Lab researchers have detected an active SMS Trojan in the United States. The malware in question is an SMS-sending Android Trojan dubbed …

DrDoS attacks to reach 800 Gbps in 2015

While the network time protocol (NTP) DrDoS threats that became prevalent in early 2014 have been contained, new distributed reflected denial of service threats will lead to …

Mobile bad bots running across most top mobile operators

During 2013, Distil Networks fingerprinted and catalogued 2.2 billion bad bots, or 31 percent of the bad bots that exist in Distil’s database of 7-billion bad bots. Bad …

Learning from others

The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry. When an organization becomes …

Exchanging threat intelligence becoming essential

A new Ponemon Institute survey included more than 700 IT and IT security pros, across businesses and government agencies with an average of 12,000 employees, who answered more …

Dissecting the unpredictable DDoS landscape

DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and …

Nine patterns make up 92 percent of security incidents

Verizon security researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that …

Rapid7 announces security certifications for Metasploit and Nexpose

Rapid7 is launching certification programs for Nexpose administrators and Metasploit Pro specialists. “Certification enables security professionals to ensure that they …

A guide to cloud encryption and tokenization

Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there’s a …

Don't miss

Cybersecurity news