Latest News

IT Forensics

Criminal underground store sells hacked server access

AlienVault has uncovered a criminal underground store dedicated to selling access to hacked (rooted) servers. Customers can buy an administrator (root) account in a hacked server, and then perpetrate criminal activities from it, distribute malware, install a botnet command & control infrastructure, upload illegal content, send spam, and so on.
27 June 2013

Malware attackers leave behind digital clues Malware attackers leave behind digital clues

Just as the science of fingerprints, DNA, and fiber analysis have become invaluable in criminal forensics, connecting the dots of an advanced cyber-attack can help identify even the most sophisticated threat actors – if researchers know what to look for.
27 June 2013

Google implements Chrome app scanning for G+ developer site

Google is implementing the “Enhanced Item Validation” process, which applies new security measures for applications submitted as part of the G+ developers program for the Chrome browser.
24 June 2013

Fake anti-virus jumps from PCs to Android

A fresh ransomware scheme is plaguing Android users by way of the well-known FakeAV malware, which has now made the leap from computers to mobile devices.
24 June 2013

Chinese hackers turn to Operation PRISM as phishing lure

Chinese cyber-espionage hackers have turned to an ironic and ingenious phishing lure to spread the NetTraveler malware: Operation PRISM, the high-profile government surveillance program that has drawn widespread criticism from the American public.
20 June 2013

(ISC)² launches Cyber Warrior Scholarship for veterans

To help combat the widening of the gap between demand for and supply of cybersecurity professionals, the (ISC)²’s nonprofit arm has launched the U.S.A. Cyber Warrior Scholarship program, aimed at providing cybersecurity career training to qualified veterans who served in the US military.
20 June 2013

Microsoft enters bug bounty fray for first time

As the threat landscape continues to deepen in both volume and complexity, bug bounties are becoming an increasingly popular way for vendors to cost-effectively uncover potentially severe exploitable security issues. Microsoft has joined the cash-payout fray for the first time, announcing three new "Heart of Blue Gold" bounty programs that will pay up to $100,000 to enterprising researchers and hackers.
19 June 2013

EiQ Networks unwraps new ‘proactive’ cyber defense monitoring

The Massachusetts-based security and compliance specialist has introduced what it is calling the “first security monitoring solution to provide automated analysis of SANS Critical Security Controls”.
18 June 2013

Big Data causes big problems for security

For enterprises, the ability to detect data breaches within minutes is critical in preventing data loss, yet only 35% of firms stated they have the ability to do this. The culprit? An ever-escalating array of data sources stemming from virtualization, anywhere, anytime work habits and an explosion of end-user devices and applications. In short, organizations around the world are finding themselves unable to harness the power of Big Data for security purposes.
18 June 2013

Apple fielded thousands of law enforcement requests for customer info so far this year

Apple has published a transparency update detailing that between December 1, 2012 and May 31, 2013, it received between 4,000 and 5,000 requests from US law enforcement for customer data.
17 June 2013

Showing 201 - 210 of 769 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×