Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised. Hackers might have ...
Tags: Computer Products, Passwords
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers Target, Computer Products
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers, Web Hosting Servers
According to a new security report released today by NQ Mobile Inc., a global provider of mobile Internet services, mobile malware threats increased 163 percent to more than 65,000 in 2012. The company warns, however, that the problem is ...
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened ...
Tags: SANS Institute, enterprise network, IT exec
Faster Web browsing and lower data use might be on the cards for Android mobile phone users if they download a new version of the Chrome Web browser offered by Google. The latest Chrome Beta for Android, which was made available on ...
Tags: Google, Android Browser, software
According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
Twitter has implemented DMARC, a standard for preventing email spoofing, in order to make it harder for attackers to send phishing emails that appear to come from twitter.com addresses. Twitter users are constantly targeted in phishing ...
Tags: Twitter, DMARC, company news
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security