New hacking group hits government websites, leaks stolen data
A hacker group that named itself “The Unknowns” has recently boasted on Pastebin of having compromised a number of government, business and educational websites, …
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
The difficulties in sizing up botnets
The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size …
RedKit exploit kit spotted in the wild
A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and …
“Free additional storage” phishing emails doing rounds
Symantec researchers warn about a variety of fake emails supposedly coming from popular email and online storage services, offering “storage quota upgrades”. A …
Android drive-by download malware served by hacked websites
A number of legitimate but compromised websites have been spotted serving Android malware to unsuspecting visitors, warns Lookout. The downloading of the malware, which poses …
Location-based apps thrive despite privacy concerns
Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …
Autorun-based threats account for 12% of global infections
Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …