NLPRank: An innovative tool for blocking APT malicious domains
Security researchers working at OpenDNS’ Security Labs have developed NLPRank, a new system that helps detect – quickly and relatively accurately – phishing …
Anthem refuses comprehensive IT security audit after the breach
Recently breached US health insurer Anthem has refused to let The Office of Personnel Management’s Office of Inspector General (OIG) perform a full security audit of its …
Angler exploit kit and domain shadowing: A deadly combination
Attackers wielding the infamous Angler exploit kit are increasingly using hijacked registrant accounts to create huge amounts of subdomains for both redirecting victims and …
Mandarin Oriental suffers credit card breach
Mandarin Oriental, the hotel group managing luxury hotels and resorts in Asia, Europe, the US and Latin America, has confirmed that “the credit card systems in an …
Fake guides and cracked apps on Google Play Books lead to malware
Google has become pretty swift at finding and removing fake and malicious apps from its Google Play store, but there is one part of it where malware peddlers still seem to …
What security tools do healthcare organizations lack?
The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused …
Banking Trojans target nearly 1,500 financial institutions
Nine of the most common and sophisticated financial Trojans in use are targeting 1,467 financial institutions in 86 countries, says a Symantec report compiled after the …
How DDoS attacks impact service providers
There’s a striking disparity between how threatened service providers feel by potential DDoS attacks and how prepared they are to mitigate one, according to a Black …
IoT architectures to impact analytics, stakeholders and infrastructure
The opportunity of the Internet of Things (IoT) has everything to do with data. By distributing and diversifying data, IoT architectures will dramatically impact analytics, …
5 tips to avoid identity theft
“Tax fraud is widespread and happening as you read this,” says security and identity theft expert for Credit Sesame, Neal O’Farrell. “In the first week …
New PoS malware family discovered
A new family of PoS malware has been discovered and analyzed by Trend Micro researchers. They dubbed it PwnPOS, and believe that it has been in used since 2013, possibly even …
US air traffic control system is riddled with vulnerabilities
A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous