Phishing campaigns target diverse webmail users at once
Every now and then, phishers mount campaigns that simultaneously target users of different online services. This time the lures are different: access to a document that is …
Average enterprise generates 10,000 security events daily
Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …
Arrests in international voice-phishing case
Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …
NIST guidelines help developers build security in from the start
A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …
The evolution of an Iranian hacker group
Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …
Despite hearing about Heartbleed, 47% have not changed their passwords
In light of the recent Heartbleed bug, LifeLock announced survey results that reveal consumers’ behavior and attitudes surrounding the security flaw. The recent survey, …
Toshiba launches HDDs for surveillance applications
Toshiba launched the MD03ACA-V series, high-capacity hard disk drives for surveillance applications. Toshiba’s purpose-built line of 3.5-inch HDDs are available in …
Microsoft releases eight security updates
There is a lot going on in the updates from Microsoft this month, including some very interesting and long time coming changes. Also, it’s the highest volume of …
NSA allegedly puts backdoors on American-made network devices
Glenn Greenwald’s new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura …
Building a more secure and agile Internet
The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) awarded $15 million to support three, multi-institutional …
“Your Photos Are being Used” phishing scam targeting Facebook users
Another day, another Facebook phishing scam. This one comes in the form of a warning sent by a friend: “OMG YOUR PHOTOS ARE BEING USED ON THIS SITE.” The victim, …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …