Latest Posts | Page 132


As of late, Apple has been looking a little more like Windows. Or at least, feeling the pain known all too well by its Redmond-based counterpart. In recent days, the seemingly impenetrable Mac OS X platform was pummeled by not one, but two information-stealing attacks typically reserved for Windows. One of those in-the-wild attacks was a gaping Java vulnerability that enabled cyber hackers to install the Flashback Trojan onto victims’ Mac OS Xs. The Flashback Trojan stealthily made its way onto users' Windows machines last fall by disguising... [Read More]
by RSS Stefanie Hoffman  |  Apr 05, 2012  |  Filed in: Industry Trends
Tags:
Once upon a time in 2009 the City of Bozeman, Montana found itself at the brunt of a public firestorm when it became known that members had the audacity to request social networking credentials from applicants. Oh, those were the good ole' days. The issue once again came to the forefront of public attention in recent weeks when news reports started indicating that not only are other employers following suit, but demanding users' social networking credentials was staring to become an accepted hiring practice. In one story, the AP illuminated... [Read More]
by RSS Stefanie Hoffman  |  Apr 02, 2012  |  Filed in: Industry Trends
“Big” seemed to epitomize last week in security—from big botnet takedowns to big breaches to big privacy issues related to a certain social networking site. Here is this week's lowdown. Zeus Takedown: Microsoft kicked off the week by announcing late Sunday night that it had taken down several of the most damaging botnets connected to the powerful Zeus banking Trojan. Altogether, the Microsoft Digital Crimes Unit, along with the United States Marshals and several financial organizations aligned to coordinate an 'unprecedented, proactive cross-industry... [Read More]
by RSS Stefanie Hoffman  |  Apr 02, 2012  |  Filed in: Industry Trends
Application security: It's something that no network can live without, especially in the age of Web 2.0. But what is application security exactly and what is its role in the enterprise? While most users have a very concrete understanding of most standard security measures, such as antivirus, firewalls and intrusion prevention, the definition of application security seems to be a bit more nebulous, if not more misunderstood, with the emergence of Web 2.0 and the explosion of social, interactive and streaming media. So here's a bit of a tutorial. Application... [Read More]
by RSS Stefanie Hoffman  |  Mar 29, 2012  |  Filed in: Industry Trends
Score another point for Microsoft. The Redmond, Wash.-based software powerhouse announced late Sunday night that it had taken down several of the most damaging botnets connected to the powerful Zeus banking Trojan. In what it described as its “most complex effort to date,” the Microsoft Digital Crimes Unit, in collaboration with the United States Marshals and several financial organizations including Financial Services—Information Sharing and Analysis Center, NACHA—The Electronic Payments Association and Kyrus Tech, aligned to coordinate... [Read More]
by RSS Stefanie Hoffman  |  Mar 26, 2012  |  Filed in: Industry Trends
Tags:
While slower than other weeks, March 19-23 was defined by a few major threats and some eye-opening reports. Here is a look at this week's security front. WordPress Domains Compromised: An untold number of WordPress domains have been compromised in a series of assaults appearing to spread the Cridex botnet, discovered by researchers at M86 and Trend Micro. The perpetrators behind the malware launched their attack by injecting malicious code on vulnerable WordPress sites and luring in victims with spammed email messages that purport to be from legitimate... [Read More]
by RSS Stefanie Hoffman  |  Mar 24, 2012  |  Filed in: Industry Trends
Tags:
These days, BYOD has moved out of the realm of trend and moved into the realm of phenomenon. And almost nowhere is this phenomenon--or rather, the growing pains associated with the birth of this phenomenon-- more keenly felt than in the healthcare sector. The reason? Inherent tensions are created with the immense benefits of mobile devices that contribute to a workplace culture dependent upon the free flow and easy availability of (potentially lifesaving) information, juxtaposed with severe (and possibly life-threatening) ramifications in the event... [Read More]
by RSS Stefanie Hoffman  |  Mar 23, 2012  |  Filed in: Industry Trends
Tags:
Perhaps one of the most fascinating aspects of the criminal underground how it follows tried-and-true business protocols. And, as budding entrepreneurs, you got to hand it to the criminal masterminds for their ingenuity and business acumen when it comes to building Cybercrime-as-a-Service infrastructure. In recent years, cyber criminals have amped up their mouse in the cat-and-mouse game of malware development, according to Derek Manky, Fortinet senior security strategist. Previously, in an effort to bullet-proof their malicious tools, cyber... [Read More]
by RSS Stefanie Hoffman  |  Mar 20, 2012  |  Filed in: Industry Trends
Tags:
Last week, malicious exploits and politically motivated attacks seemed to dominate the threat landscape. Here are a few of the week's biggest security happenings. ** MS RDP Exploit In The Wild**: Last week, researchers confirmed an active attack exploiting a Remote Desktop Protocol vulnerability in Windows that could cause a denial-of-service situation or crash a user's system completely. The critical flaw, which affects all versions of Windows, paves the way for attackers to remotely run malicious code that could create a worm rivaling the notorious... [Read More]
by RSS Stefanie Hoffman  |  Mar 19, 2012  |  Filed in: Industry Trends
Tags:
Apple's latest greatest toy, iPad 3, shipped today. But before you brave the lines at your nearest Apple or other mobile store, here are a few safety tips to remember. Stay On The Alert For Suspicious Activity: On mobile devices such as the iPad, malware and scams are often distributed via malicious or infected links. Pay close attention to your mobile bill—with an especially close eye on your SMS and Internet usage—says Axelle Apvrille, Fortinet security mobile antivirus researcher. Report any suspicious activity or aberrations to AV vendors,... [Read More]
by RSS Stefanie Hoffman  |  Mar 16, 2012  |  Filed in: Industry Trends
Tags: