Latest Cybersecurity Articles

Retailers targeted by sophisticated ModPOS malware

Retailers targeted by sophisticated ModPOS malware

Nov 24, 2015

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely…

OpenDNS listens for malicious melodies

OpenDNS listens for malicious melodies

Nov 19, 2015

Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns…

New ad-fraud botnet targets major corporations, universities

New ad-fraud botnet targets major corporations, universities

Nov 18, 2015

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.The Xindi…

Exploit kit activity up 75 percent in third quarter 2015

Exploit kit activity up 75 percent in third quarter 2015

Nov 18, 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to…

The dark side of layered security

The dark side of layered security

Nov 13, 2015

Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these…

iOS apps more vulnerable than Android

iOS apps more vulnerable than Android

Nov 10, 2015

Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as…

10 riskiest applications that have passed their expiration dates

10 riskiest applications that have passed their expiration dates

Nov 10, 2015

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

10 risky software that have passed their expiration dates

10 risky software that have passed their expiration dates

Nov 10, 2015

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

9 of 10 directors support regulator action on cybersecurity

9 of 10 directors support regulator action on cybersecurity

Nov 5, 2015

In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…

East European botnet targets Russian banks

East European botnet targets Russian banks

Nov 3, 2015

Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception,…

CSOs demanding more from cybersecurity tech

CSOs demanding more from cybersecurity tech

Oct 30, 2015

CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and…

Despite recent moves against Adobe, 80% of PCs run expired Flash

Despite recent moves against Adobe, 80% of PCs run expired Flash

Oct 28, 2015

Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…

Iranian hackers get tech support on forums

Iranian hackers get tech support on forums

Oct 27, 2015

Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.According to research released this morning by…

10 riskiest cloud services

10 riskiest cloud services

Oct 27, 2015

Risky businessImage by Tobias Van Der ElstThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks.To read this article…

Experts urge caution when putting health data in the cloud

Experts urge caution when putting health data in the cloud

Oct 23, 2015

Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…

Report: Infosec women make progress in governance, risk and compliance

Report: Infosec women make progress in governance, risk and compliance

Oct 22, 2015

Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.The…

Don’t overdo biometrics, expert warns

Don’t overdo biometrics, expert warns

Oct 22, 2015

Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.”Today, many of the major banks…

Advertising Trouble: Malicious ads that inject onto banking websites

Advertising Trouble: Malicious ads that inject onto banking websites

Oct 15, 2015

Between 5 and 15 percent of all visitors to some banking websites see ads there that don’t belong, according to some cybersecurity surveys. Some of…

‘Legitimate’ rooting apps paving way for malware

‘Legitimate’ rooting apps paving way for malware

Oct 15, 2015

Companies that create tools for “rooting” Android phones may be within the law, but they may be inadvertently paving the way for malware developers.According to…

Too many healthcare employees complacent about security

Too many healthcare employees complacent about security

Oct 13, 2015

Non-technical health care employees are too complacent about the possibility of a data breach, and few are aware that it has happened to their organizations,…

Advertising network takes on malvertisers

Advertising network takes on malvertisers

Oct 13, 2015

In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads…

Application attacks against clouds up 45%

Application attacks against clouds up 45%

Oct 12, 2015

Application attacks against clouds jumped 45 percent last year, according to a new report from Houston-based cloud security firm Alert Logic, Inc.The report was based…

Quarter of firms can’t tell how hackers get in

Quarter of firms can’t tell how hackers get in

Oct 7, 2015

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know…

Average business spends $15 million battling cybercrime

Average business spends $15 million battling cybercrime

Oct 6, 2015

The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to…

Expired certificates cost businesses $15 million per outage

Expired certificates cost businesses $15 million per outage

Sep 30, 2015

The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage — and faces another…

Does security awareness training even work?

Does security awareness training even work?

Sep 30, 2015

The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…

Healthcare firms three times more likely to see data breaches

Healthcare firms three times more likely to see data breaches

Sep 23, 2015

Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning.The…

Debit cards lag credit cards in EMV migration, putting banks at risk

Debit cards lag credit cards in EMV migration, putting banks at risk

Sep 22, 2015

Three times as many credit cards will be chip-enabled by the end of the year as debit cards, making the slower banks bigger targets for…

Russian military attacked, possibly by Chinese cyber group

Russian military attacked, possibly by Chinese cyber group

Sep 17, 2015

Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to…

As containers take off, so do security concerns

As containers take off, so do security concerns

Sep 17, 2015

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…