US cyber criminal underground a shopping free-for-all
According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…
US cyber criminal underground a shopping free-for-all
According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…
Report: Scripting languages most vulnerable, mobile apps need better crypto
According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…
Report: Scripting languages most vulnerable, mobile apps need better crypto
According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…
Most hackable devices
Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…
Most hackable devices
Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…
Retailers targeted by sophisticated ModPOS malware
The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely…
OpenDNS listens for malicious melodies
Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns…
New ad-fraud botnet targets major corporations, universities
A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.The Xindi…
Exploit kit activity up 75 percent in third quarter 2015
In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to…
The dark side of layered security
Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these…
iOS apps more vulnerable than Android
Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as…
10 riskiest applications that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
10 riskiest applications that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
10 risky software that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
9 of 10 directors support regulator action on cybersecurity
In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…
East European botnet targets Russian banks
Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception,…
CSOs demanding more from cybersecurity tech
CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and…
Despite recent moves against Adobe, 80% of PCs run expired Flash
Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…
Despite recent moves against Adobe, 80% of PCs run expired Flash
Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…
Iranian hackers get tech support on forums
Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.According to research released this morning by…
10 riskiest cloud services
Risky businessImage by Tobias Van Der ElstThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks.To read this article…
Experts urge caution when putting health data in the cloud
Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…
Report: Infosec women make progress in governance, risk and compliance
Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.The…
Don’t overdo biometrics, expert warns
Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.”Today, many of the major banks…
Advertising Trouble: Malicious ads that inject onto banking websites
Between 5 and 15 percent of all visitors to some banking websites see ads there that don’t belong, according to some cybersecurity surveys. Some of…
‘Legitimate’ rooting apps paving way for malware
Companies that create tools for “rooting” Android phones may be within the law, but they may be inadvertently paving the way for malware developers.According to…
Too many healthcare employees complacent about security
Non-technical health care employees are too complacent about the possibility of a data breach, and few are aware that it has happened to their organizations,…
Advertising network takes on malvertisers
In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads…
Application attacks against clouds up 45%
Application attacks against clouds jumped 45 percent last year, according to a new report from Houston-based cloud security firm Alert Logic, Inc.The report was based…