The fuel that drives global cybercrime
Karine de Ponteves is a FortiGuard AV analyst with Fortinet. In this interview she discusses how cybercriminals exploit major events to deliver malware, the oversharing of …
Spam filtering tools fail short with phishing attacks
Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …
Android malware masquerading as legitimate AV apps
If you’re an Android user, you probably couldn’t help but notice the hundreds of articles about the proliferation of malware created specifically for that …
Apple, Amazon change their security policies following epic hack
In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …
Beware of “Free Apple Product” SMS messages
Given the all-around popularity of various Apple devices, it’s no wonder scammers often “offer” them as prizes in bogus contests and lotteries. The latest of …
Trend Micro unleashes big data analytics
Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company’s products and …
SignatureLink introduces all-in-one ecommerce fraud solution
Until now, ecommerce fraud solutions accomplished one objective: screen out online payment fraud based on site visitor behaviors, devices, and other criteria. The …
Alert Logic launches SaaS web application firewall
Alert Logic announced the availability of Alert Logic Web Security Manager with ActiveWatch to protect web applications against threats and attacks. The solution combines WAF …
Iran government systems to be taken off the Internet for protection
Remember when Iran expressed its intention of setting up a national Internet disconnected from the World Wide Web in order to keep its citizens safe from Western ideas and …
Reuters hack was due to old WordPress version
While the individuals responsible for the recent hijacking of Reuters’ blogging platform and one of its Twitter accounts are still unknown, it has emerged that the …
Gizmodo hack reveals worrying flaws in data management policies
Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either