According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
A report by Gartner predicts that the number of sophisticated attacks on e-commerce and financial industries will increase in 2013. According to Gartner, during these incidents attackers will send out targeted commands to the memory of ...
Tags: e-commerce industrie, financial industrie, applications
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to organisations in 2013. The newly released Verizon Data Breach Investigation Report noted that while ...
Tags: Verizon, authentication attacks, hacktivism
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers. Oracle released two emergency patches on Sunday for its Java programming language and ...
Tags: Trend Micro, malicious software, Java
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
Infoworld - Nearly 15 years since the term "open source" was first applied, the trends driving the open source movement are not the same. Back then, price advantage, direct differentiation on licensing versus proprietary software, ...
Tags: forces driving, open source, proprietary software, Microsoft
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
French security firm Intego discovered a new Mac Trojan horse this week that is being used to target specific individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only antivirus developer -- and called "Morcut" by Sophos, is ...
Tags: Intego, Mac, Trojan horse, Hacking Toolkit
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime. Speaking at this week’s SNW Europe conference in Frankfurt, Joe Llewelyn, head of global sales training ...
Tags: Viruses, Vm Aware, Computer Products
Advanced analysis of the Morcut Mac OS X malware that targets computers running Apple’s Mac operating system (OS) or Microsoft’s Windows OS has revealed that it also targets virtual machines and Windows mobiles. The malware, ...
Tags: Morcut Malware, Virtual Machines, Symantec, Computer Products
While newly-discovered malware that attacks VMware virtual machines is no cause for undue concern, users can take some basic steps to protect apps and data, says security firm Trend Micro. Earlier this week, advanced analysis of the ...
Tags: VMware virtual machines, security firm, Trend Micro, Morcut Mac OS X
The UK Police Central e-Crime Unit (PCeU) has arrested three people in connection to using ransomware, which security experts say poses a threat to businesses as well as consumers. Ransomware is malicious software that is inadvertently ...
Tags: Ransomware, software, computer, blackmailers
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting