cybercrime
Spammers establish their own fake URL-shortening services
For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …
40% of IT staff could wreak havoc to your network
A survey showed that 40% of IT staff admit that they could hold their employers hostage – even after they’ve left for other employment – by making it …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Stolen credit card numbers advertised via Twitter
You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …
HADOPI stops monitoring for copyright infringement due to breach
Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …
Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …
PSN attackers allegedly used Amazon cloud for attack
Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …
Cyber criminals moving operations to Canada
Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …
Sony suffers third breach, PSN still down
Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …
Sony breach due to outdated, unpatched servers?
The congressional testimony before the House Subcommittee on Commerce, Manufacturing, and Trade held yesterday morning has revealed many things that shed a totally different …
Cybercriminals expand repertoire of tricks to avoid detection
March was testament to the fact that cybercriminals are not averse to exploiting tragedies in order to spread malware, according to Kaspersky Lab. Scammers and malware writers …
24.6 million Sony Online Entertainment accounts stolen
Sony’s ongoing investigation of illegal intrusions into Sony Online Entertainment systems revealed that attackers may have stolen personal information from approximately …
Featured news
Resources
Don't miss
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024
- The sixth sense of cybersecurity: How AI spots threats before they strike