cybercrime
Coding error reveals RSA attackers operated from China
A simple error message returned by a server to which a malware sample was trying to connect revealed to Dell SecureWorks researchers the origin of the RSA attack, says Joe …
A unique malware file is created every half-second
Sophos has released its Mid-Year 2011 Security Threat Report, which reveals that since the beginning of 2011, the company has identified an average of 150,000 malware samples …
Arrested “Topiary” has a name, faces five charges
The alleged LulzSec member arrested last week by the e-Crime Unit of London’s Metropolitan Police on the Shetland Islands has a name: Jake Davis. He is 18 years old …
LulzSec member Topiary arrested?
Was LulzSec member Topiary arrested yesterday by the e-Crime Unit of London’s Metropolitan Police? “The man arrested is believed to be linked to an ongoing …
Phishers becoming sophisticated marketers of fraud
Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …
Arrested Anonymous activists just a small part of a long list
Even though the FBI started serving search warrants and arresting people suspected in participating in the Anonymous’ “Operation Payback” way back in …
The problem with current cyber-liability insurance policies
The repercussion from the massive breach are still reverberating through Sony and, as the company managers move to minimize the losses, an unexpected development could throw a …
SpyEye Trojan country hit list
The number of financial institutions targeted by the SpyEye Trojan is growing, according to Trusteer. Risk analysis teams have also observed an increase in the number of …
Companies underestimate costs of security breaches
Aveksa announced the findings of a recent survey conducted to examine many different facets of IT security, including:: Concerns about moving sensitive applications and data …
Global analysis of 10 million web attacks
Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …
Enhanced phishing methods on the rise
There’s been an increase in targeted and combined email-based threats, a new twist in phishing attacks, and an escalation in social engineering scams through popular …
Security recommendations to prevent cyber intrusions
Cyber thieves, hacktivists, pranksters, nation-states, and malicious coders for hire all pose serious threats to the security of both government and private sector networks. A …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)