DDoS bot masquerades as Java update
An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …
Security recommendations to prevent cyber intrusions
Cyber thieves, hacktivists, pranksters, nation-states, and malicious coders for hire all pose serious threats to the security of both government and private sector networks. A …
Internet activist charged with hacking, theft of millions of digital documents
24-year-old Aaron Swartz, renowned programmer and Internet activist, stands accused of having stolen over 4 million digital documents from MIT’s JSTOR archive with the …
Apple releases Mac OS X Lion
Apple released Mac OS X Lion (v10.7), which takes some of the best ideas from iPad and brings them back to the Mac. Security-wise, Lion brings an improvement to Address space …
How to secure patient records on mobile devices
Mobile devices have become as common as the stethoscope in patient’s rooms. Physicians routinely review patients’ electronic health records (EHR), read test …
Google warns users about active malware infection
Google has begun notifying its users that a particular piece of malware is installed on their computers by showing a big yellow notification above their search results (click …
16 arrested for Anonymous-branded cyber attacks
Fourteen individuals were arrested on Monday by FBI agents on charges related to their alleged involvement in a cyber attack on PayPal’s website as part of an action …
Android malware trends
Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …
Santander customers targeted with clever phishing scam
Brazilian customers of Santander, one of the largest banks in the world, have been targeted by a very clever phishing scam that did not involve clicking on malicious links in …
In the “speed vs. security” battle, speed still wins
The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong …
A new approach to circumventing state-level Internet censorship
A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade