Red October: The hunt for data
The recent discovery of the Red October malware has focused a lot on its effects, but inadequate attention has been given to its purpose – which successfully evaded …
Federated single sign-on to dominate by 2016
A well-executed single sign-on (SSO) strategy reduces password-related support incidents and provides users with improved convenience and more-efficient authentication …
Week in review: Twitter and NYT hacks, the future of scareware
Here’s an overview of some of last week’s most interesting news and articles: Trojan uses anti-spam system to keep in touch with C&C servers Most malware is …
Twitter confirms hack compromised 250,000 user accounts
Twitter has reset the passwords and revoked session tokens of some 250,000 Twitter users following a successful breach of a database containing user data. The compromise has …
Wall Street Journal says it has also been hacked
A day after the New York Times revealed that its network and the computers of 53 of their employees have been compromised by hackers believed to be based in China, the Wall …
Fake Booking.com warning leads to tons of malware
A massive spam campaign impersonating the popular online hotel reservations agency Booking.com is underway, trying to convince recipients to download a document supposedly …
Cybergangs embracing crimeware over social engineering
The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …
Malicious Chrome extensions promoted via Facebook
Malicious Chrome extensions are lurking on the official Chrome Web Store, warns Kaspersky Lab Expert Fabio Assolini, and the campaign for leading users to them starts on …
ESET releases Mac security products
ESET launched new products for the OS X platform: ESET Cyber Security Pro and ESET Cyber Security. According to a recent Macworld magazine poll, only half of Mac users employ …
Most organizations plan to increase number of cloud apps
According to the results of a OneLogin survey on the adoption, use and security of cloud applications, a large majority of respondents, 78%, plan to increase the number of …
UnboundID releases new identity data platform
UnboundID released cersion 4.0 of the UnboundID Identity Data Platform, providing data unification, new levels of security, and real-time scalability to manage identity data. …
IBM combines security intelligence and big data
Advanced attacks, widespread fraud and the pervasive use of social media, mobile and cloud computing are drastically altering the security landscape. As organizations …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends