Please turn on your JavaScript for this page to function normally.
Encrypting Trojan targets users, demands $5,000

Russian anti-virus company Doctor Web is warning users of an active ransomware campaign executed through brute force attack via the RDP protocol on target machines. Once …

Doctors used silicone fingers to fool fingerprint scanner

Fingerprint scanners might not work with severed fingers, but artificial ones still manage to fool them, as proved by the recent discovery of a fraudulent scheme set up by …

Identity fraud is up, but banks are up to the security challenge

In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …

Fake Pope Twitter account proves malicious potential of breaking news

Mere minutes after it become publicly known that Argentinian cardinal Jorge Mario Bergoglio was elected to serve as the new Pope, Internet users around the world began …

Microsoft continues to focus on security in their products

86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …

Database security is too complex to implement

A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …

NIST National Vulnerability Database down due to malware

U.S. National Institute of Standards and Technology’s National Vulnerability Database is unavailable, and has been since they discovered malware on some of its servers …

Governance and assurance guidance for big data

Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But …

Fight cybercrime with a visit to Infosecurity Europe 2013

Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-attacks which have increasingly been viewed as one of the …

Google unveils site to help webmasters recover their hacked sites

As the most widely used Internet search engine, Google Search is the de-facto starting point for hundreds of millions of queries each day. It you are an administrator of a …

Published celeb credit reports came from government-mandated website

U.S. First Lady Michelle Obama, former California Governor Arnold Schwarzenegger, former U.S. Vice President Al Gore and socialite Kris Jenner are four additional victims of …

Mandiant threat report on advanced targeted attacks

Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …

Don't miss

Cybersecurity news