Industry Trends & News | Page 72


With a seemingly unstoppable upsurge of targeted attacks in recent years, hackers are naturally finding better ways to acquire personal identifying information to really hone in on their victims. They're called second stage attacks. Specifically, second stage attacks are multi-faceted cyber assaults in which the attackers infiltrate a network and steal data from one organization to leverage a more targeted, victim-specific attack on another account. “Second stage attacks are more effective and more dangerous because of the targeted aspect, and... [Read More]
by RSS Stefanie Hoffman  |  Mar 12, 2012  |  Filed in: Industry Trends & News
Tags:
No stranger to privacy issues, the search giant Google seems to have taken an even bigger page out of Facebook’s manual lately. And privacy advocates are revving their engines. Google's newly rewritten privacy policy, enacted Thursday, essentially aggregates all user data from its combined services into one uber database, with an objective to create more comprehensive—and much more detailed—user profiles that would help the search giant better target it ads, among other things. Altogether, the new privacy rules combine 60 out of over 70... [Read More]
by RSS Stefanie Hoffman  |  Mar 02, 2012  |  Filed in: Industry Trends & News
Tags:
Malware, like anything else, runs in cycles. And as of late, trends seem to be pointing to extortion as the latest developing theme. The ransom theme was given center stage April of last year after an attacker targeted Hyundai Capital's network in South Korea and swiped copious data belonging to more than 420,000 customers. The attacker demanded a ransom of several hundred million Korean won, which, if not paid, would trigger a release of confidential customer names, residence registration numbers, mobile phone numbers and e-mail addresses. The... [Read More]
by RSS Stefanie Hoffman  |  Mar 01, 2012  |  Filed in: Industry Trends & News
Tags:
RSA Conference is upon us once again. This year's RSA Conference is hosting around 350 exhibitors, and with the economy slowly on the mend, the show promises to have strong attendance, according to inside sources. In addition to the usual array of raffles, costumes, and “Wheel of Fortune” gameshow gimics, the show floor was abuzz with its own unique alphabet soup (e.g. BYOD, APTs) while mobile threats, securing the cloud and virtualized platforms, and targeted attacks became the topics_ du jour_. So what's all the rage in network security?... [Read More]
by RSS Stefanie Hoffman  |  Feb 29, 2012  |  Filed in: Industry Trends & News
Tags:
It's that time of year again. With less than two months to go before the April 15 tax deadline, scammers are in full swing, eager to separate taxpayers from their hard earned refunds. No doubt, scammers will pelt unsuspecting victims with a slew of social engineering ploys for bigger-than-expected or fast track refunds, official looking alerts warning users about tax complications, offers for some kind of “too-good-to-be-true” online tax deal or service, or e-mails impersonating the IRS in search of personally identifying information. This... [Read More]
by RSS Stefanie Hoffman  |  Feb 28, 2012  |  Filed in: Industry Trends & News
Tags:
This week, the issue of online data privacy received more than its fair share of attention. And with good reason. The Obama administration announced Thursday that it intended to place increased importance on online privacy with the proposed "Consumer Privacy Bill of Rights,” designed to give users a greater say in how their online information is handled, while establishing protections to prevent consumer data from being misused by businesses or advertisers. The proposed Bill of Rights—a collaborative effort to be spearheaded by the Commerce... [Read More]
by RSS Stefanie Hoffman  |  Feb 24, 2012  |  Filed in: Industry Trends & News
Tags:
The term "survival of the fittest" seems to be particularly apt when it comes to the Koobface worm. Over the years, the notorious social networking botnet has survived an almost unrelenting media spotlight, serial security improvements and even a massive international takedown, and has thus far managed to stay on its feet. And its adaptability could possibly bode well as it enters the next phase of its existence. The prolific botnet Koobface, the notorious anagram of Facebook, got its start hijacking social networking accounts via a myriad of social... [Read More]
by RSS Stefanie Hoffman  |  Feb 23, 2012  |  Filed in: Industry Trends & News
Tags:
More and more organizations are opening up their networks with invitations that say BYOD (bring your own device) and seeing everything from iPads to the latest Android gadget walk in their doors. And no one can deny that this trend is accelerating rapidly without any clear sign of stopping. According to a December 2011 Forrester Report, half of all US information workers pay for their smartphones and monthly plans, while three-quarters pick the platform of their choice rather than accept an IT standard issue device. For organizations, particularly... [Read More]
by RSS Stefanie Hoffman  |  Feb 21, 2012  |  Filed in: Industry Trends & News
Tags:
This week it's no secret that the Fortinet team that has been hitting it pretty hard on the Adobe front. For San Jose, Calif.-based Adobe, Valentine's Day came with a bang when researcher Honggang Ren of Fortinet's FortiGuard Labs detected a total of seven out of nine critical vulnerabilities in Adobe's Shockwave Player 11.6.3.633 (CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, CVE-2012-0766) and earlier versions for both Windows and Mac OS X. According to Ren, the memory corruption vulnerabilities were... [Read More]
by RSS Stefanie Hoffman  |  Feb 17, 2012  |  Filed in: Industry Trends & News
Tags:
These days, healthcare organizations have their hands full when it comes to compliance. In addition to adhering to a slew of industry regulations, such as HIPAA and HITECH, designed to protect patients' confidential information, medical facilities of all sizes are also facing increasingly stringent requirements from the Payment Card Industry Data Security Standard. That's right—PCI. PCI DSS, a series of 12 rigorous and detailed mandates governing customer data protection, applies to any organization that runs or processes credit card information—and... [Read More]
by RSS Stefanie Hoffman  |  Feb 16, 2012  |  Filed in: Industry Trends & News
Tags: