Virtualization doubles the cost of security breach
When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional…
Tips for protecting your business against cyber extortion
CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up.But that’s only one type of cyber extortion, according…
DRM could be making a comeback in the enterprise
Digital rights management might be coming back to the enterprise, experts say, as long as usability issues don’t get in the way.You might remember the…
Report: ISIS-related cyber war reaches Alabama
The war against Islamic State has resulted in a cyber attack on US soil, and other such attacks are likely, according to a new report…
DDoS attacks double as criminals leverage home routers, WordPress plugins
The number of distributed denial-of-service attacks in the second quarter of this year was more than double that of last year, according to a new…
CISOs facing boards need better business, communication skills
As information security becomes a more important topic of interest for corporate boards, CISOs are increasingly asked to step up and brief boards on cyber…
New IP address blacklist based on Web chatter
Traditionally, blacklists of malicious IP addresses are assembled using honeypots and intrusion detection systems but a new approach, analyzing chatter on the dark and open…
Darkhotel expands targets, ups sophistication, leverages Hacking Team exploit
Darkhotel — the elite spying group discovered luxury hotels’ Wi-Fi networks last year — is back with new targets, new defensive capabilities, and a new…
Darkhotel expands targets, ups sophistication, leverages Hacking Team exploit
Darkhotel — the elite spying group discovered luxury hotels’ Wi-Fi networks last year — is back with new targets, new defensive capabilities, and a new…
Report: IoT is the next frontier for ransomware
LAS VEGAS — The growth of the Internet of Things will offer new ransomware opportunities for cybercriminals, according to a report released Thursday by Symantec.Researchers…
GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC
The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks — they also spied on several countries on behalf of Russia,…
Terracotta VPN hijacks servers for commercial gain
The Terracotta commercial VPN, marketed in China under a number of different brand names, uses hacked servers to power its network and the network has…
T-Mobile caught in crossfire of injected ad war with Flash Networks
LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war,…
T-Mobile caught in crossfire of war over injected ads
UPDATE: Flash Networks comments have been added to the original story.LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads…
Neiman Marcus case a reminder to check your cyber coverage
In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…
Banks balance security and workflow when encrypting in the cloud
When financial institutions store data in the cloud, they use different kinds of encryption depending on security and workflow requirements, according to a new report…
Accuvant researchers to release open source RFID access tool
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been…
Google Drive phishing is back — with obfuscation
If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking — it…
Stagefright vulnerability allows criminals to send malware by text
Vulnerabilities in Android’s “Stagefright” code allows criminals to send malware to any user via text message — and the user gets infected without even having…
HP: 100% of smartwatches have security flaws
In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw,…
InfoSec pros spend most time, money on self-inflicted problems
According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on…
How to surf the Dark Web for fun and profit
Life is tough if you’re a criminal.Sure, one big score can set you up for life. If you’re smart and disciplined, you can retire early.…
Data explosion offers challenges, opportunities to security pros
230 million patients. 3,300 hospitals. 900,000 healthcare professionals. 98 percent of U.S. pharmacies. More than 700 different electronic health record platforms. 764 million medication histories.…
Regulators seek to limit security software exports
The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…
Electronic Frontier Foundation celebrates 25 years of defending online privacy
The Electronic Frontier Foundation is the digital world’s top watchdog when it comes to privacy and free expression. But while cops and firefighters are often…
Report: Malvertisers now using SSL redirects
Advertising networks have gotten better at spotting malicious downloads embedded into advertisements, so criminals began using redirects, even chains of a dozen redirects or more,…
‘Butterfly’ group goes after corporate IP
Symantec has identified a group of cybercriminals, whom they’ve named “Butterfly,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft…
Malvertising reaches record levels in June
Malvertising campaigns have reached more users than ever before, reported security firm Invincea yesterday, with many brand-name websites affected — including CBS Sports, Yahoo and…
Top global security experts defend encryption
As government officials continue to plea the case against strong encryption, a group of high-profile international security experts have published a paper arguing that allowing…
Despite warnings, majority of firms still run some Windows Server 2003
Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July…