Industry Trends & News | Page 66


Score another point for Microsoft. The Redmond, Wash.-based software powerhouse announced late Sunday night that it had taken down several of the most damaging botnets connected to the powerful Zeus banking Trojan. In what it described as its “most complex effort to date,” the Microsoft Digital Crimes Unit, in collaboration with the United States Marshals and several financial organizations including Financial Services—Information Sharing and Analysis Center, NACHA—The Electronic Payments Association and Kyrus Tech, aligned to coordinate... [Read More]
by RSS Stefanie Hoffman  |  Mar 26, 2012  |  Filed in: Industry Trends & News
Tags:
While slower than other weeks, March 19-23 was defined by a few major threats and some eye-opening reports. Here is a look at this week's security front. WordPress Domains Compromised: An untold number of WordPress domains have been compromised in a series of assaults appearing to spread the Cridex botnet, discovered by researchers at M86 and Trend Micro. The perpetrators behind the malware launched their attack by injecting malicious code on vulnerable WordPress sites and luring in victims with spammed email messages that purport to be from legitimate... [Read More]
by RSS Stefanie Hoffman  |  Mar 24, 2012  |  Filed in: Industry Trends & News
Tags:
These days, BYOD has moved out of the realm of trend and moved into the realm of phenomenon. And almost nowhere is this phenomenon--or rather, the growing pains associated with the birth of this phenomenon-- more keenly felt than in the healthcare sector. The reason? Inherent tensions are created with the immense benefits of mobile devices that contribute to a workplace culture dependent upon the free flow and easy availability of (potentially lifesaving) information, juxtaposed with severe (and possibly life-threatening) ramifications in the event... [Read More]
by RSS Stefanie Hoffman  |  Mar 23, 2012  |  Filed in: Industry Trends & News
Tags:
Perhaps one of the most fascinating aspects of the criminal underground how it follows tried-and-true business protocols. And, as budding entrepreneurs, you got to hand it to the criminal masterminds for their ingenuity and business acumen when it comes to building Cybercrime-as-a-Service infrastructure. In recent years, cyber criminals have amped up their mouse in the cat-and-mouse game of malware development, according to Derek Manky, Fortinet senior security strategist. Previously, in an effort to bullet-proof their malicious tools, cyber... [Read More]
by RSS Stefanie Hoffman  |  Mar 20, 2012  |  Filed in: Industry Trends & News
Tags:
Last week, malicious exploits and politically motivated attacks seemed to dominate the threat landscape. Here are a few of the week's biggest security happenings. ** MS RDP Exploit In The Wild**: Last week, researchers confirmed an active attack exploiting a Remote Desktop Protocol vulnerability in Windows that could cause a denial-of-service situation or crash a user's system completely. The critical flaw, which affects all versions of Windows, paves the way for attackers to remotely run malicious code that could create a worm rivaling the notorious... [Read More]
by RSS Stefanie Hoffman  |  Mar 19, 2012  |  Filed in: Industry Trends & News
Tags:
Apple's latest greatest toy, iPad 3, shipped today. But before you brave the lines at your nearest Apple or other mobile store, here are a few safety tips to remember. Stay On The Alert For Suspicious Activity: On mobile devices such as the iPad, malware and scams are often distributed via malicious or infected links. Pay close attention to your mobile bill—with an especially close eye on your SMS and Internet usage—says Axelle Apvrille, Fortinet security mobile antivirus researcher. Report any suspicious activity or aberrations to AV vendors,... [Read More]
by RSS Stefanie Hoffman  |  Mar 16, 2012  |  Filed in: Industry Trends & News
Tags:
It could have been a script from a B movie. Top military officials from the North Atlantic Treaty Organization fell victim to a cyber attack because they simply accepted a fake friend request on Facebook. In a tried and true attack, cyber criminals once again exploited users' implicit an unquestioning trust on social networks by spoofing a Facebook page impersonating the Supreme Allied Commander Europe (SACEUR) Admiral James Stavridis. The social engineering attack was likely an attempt to glean email addresses, login credentials and other bits... [Read More]
by RSS Stefanie Hoffman  |  Mar 14, 2012  |  Filed in: Industry Trends & News
Tags:
To say the least, Apple has had a lot on its plate lately. The company and extended gadget community is still abuzz with news of the recently unveiled iPad 3, Apple TV and even an updated iTunes, announced last week. But alongside its newly revealed tech toys, Apple has of late delivered a one-two punch with a pair of monster updates that essentially give a security makeover to its Safari Web browser and iOS platforms. On Monday Cupertino issued an update for its Web browser that patched a record 83 security vulnerabilities in its latest Safari... [Read More]
by RSS Stefanie Hoffman  |  Mar 13, 2012  |  Filed in: Industry Trends & News
Tags:
Fresh on the heels of RSA, the security world is still rife with high-profile hacks, international crackdowns and mega security updates. Here is a look at last week's highlights. Google Chrome Compromised, Patched: It might be a record, but Google was uber quick to patch critical zero-day security holes in its Chrome browser less than 24 hours after they were exposed in two separate attacks during the CanSecWest conference Wednesday. In one hack, Vupen Security researchers broke into the Chrome browser in a matter of minutes during Pwn2Own, the... [Read More]
by RSS Stefanie Hoffman  |  Mar 12, 2012  |  Filed in: Industry Trends & News
Tags:
With a seemingly unstoppable upsurge of targeted attacks in recent years, hackers are naturally finding better ways to acquire personal identifying information to really hone in on their victims. They're called second stage attacks. Specifically, second stage attacks are multi-faceted cyber assaults in which the attackers infiltrate a network and steal data from one organization to leverage a more targeted, victim-specific attack on another account. “Second stage attacks are more effective and more dangerous because of the targeted aspect, and... [Read More]
by RSS Stefanie Hoffman  |  Mar 12, 2012  |  Filed in: Industry Trends & News
Tags: