Cybergangs embracing crimeware over social engineering
The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …
Malicious Chrome extensions promoted via Facebook
Malicious Chrome extensions are lurking on the official Chrome Web Store, warns Kaspersky Lab Expert Fabio Assolini, and the campaign for leading users to them starts on …
ESET releases Mac security products
ESET launched new products for the OS X platform: ESET Cyber Security Pro and ESET Cyber Security. According to a recent Macworld magazine poll, only half of Mac users employ …
Most organizations plan to increase number of cloud apps
According to the results of a OneLogin survey on the adoption, use and security of cloud applications, a large majority of respondents, 78%, plan to increase the number of …
UnboundID releases new identity data platform
UnboundID released cersion 4.0 of the UnboundID Identity Data Platform, providing data unification, new levels of security, and real-time scalability to manage identity data. …
IBM combines security intelligence and big data
Advanced attacks, widespread fraud and the pervasive use of social media, mobile and cloud computing are drastically altering the security landscape. As organizations …
GitHub MitM attack orchestrated by Chinese censors?
China-based users and visitors of GitHub, the globally popular online source code repository, have been targeted with an man-in-the-middle attack late last Friday, reports …
Aerospace and defense firms targeted with clever spear phishing
Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a …
Scareware trends and expected developments
While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …
Social media has eroded workplace privacy
More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG. The seventh installment in …
China-based hackers infiltrated New York Times’ network
The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …
High-risk Broadcom UPnP stack remote root vulnerability
Recently, DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. Further research revealed that the …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC