Retailers targeted by sophisticated ModPOS malware
The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely…
OpenDNS listens for malicious melodies
Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns…
New ad-fraud botnet targets major corporations, universities
A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.The Xindi…
Exploit kit activity up 75 percent in third quarter 2015
In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to…
The dark side of layered security
Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these…
iOS apps more vulnerable than Android
Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as…
10 riskiest applications that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
10 risky software that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
9 of 10 directors support regulator action on cybersecurity
In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…
East European botnet targets Russian banks
Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception,…
CSOs demanding more from cybersecurity tech
CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and…
Despite recent moves against Adobe, 80% of PCs run expired Flash
Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…
Iranian hackers get tech support on forums
Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.According to research released this morning by…
10 riskiest cloud services
Risky businessImage by Tobias Van Der ElstThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks.To read this article…
Experts urge caution when putting health data in the cloud
Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…
Report: Infosec women make progress in governance, risk and compliance
Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.The…
Don’t overdo biometrics, expert warns
Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.”Today, many of the major banks…
Advertising Trouble: Malicious ads that inject onto banking websites
Between 5 and 15 percent of all visitors to some banking websites see ads there that don’t belong, according to some cybersecurity surveys. Some of…
‘Legitimate’ rooting apps paving way for malware
Companies that create tools for “rooting” Android phones may be within the law, but they may be inadvertently paving the way for malware developers.According to…
Too many healthcare employees complacent about security
Non-technical health care employees are too complacent about the possibility of a data breach, and few are aware that it has happened to their organizations,…
Advertising network takes on malvertisers
In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads…
Application attacks against clouds up 45%
Application attacks against clouds jumped 45 percent last year, according to a new report from Houston-based cloud security firm Alert Logic, Inc.The report was based…
Quarter of firms can’t tell how hackers get in
The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know…
Average business spends $15 million battling cybercrime
The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to…
Expired certificates cost businesses $15 million per outage
The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage — and faces another…
Does security awareness training even work?
The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…
Healthcare firms three times more likely to see data breaches
Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning.The…
Debit cards lag credit cards in EMV migration, putting banks at risk
Three times as many credit cards will be chip-enabled by the end of the year as debit cards, making the slower banks bigger targets for…
Russian military attacked, possibly by Chinese cyber group
Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to…
As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…