Avecto has issued a list of five security trends it forecasts for the next twelve months: BYOD will continue to cause sleepless nights, Apple will lose market share, there’ll be a sprinkling of Windows 8 migrations, Cloud will take ...
Tags: Avecto, security trends, BYOD, Security
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber
A hacker group calling itself the Arab Youth Group has claimed responsibility for what appears to be a serious hacking attack on Saudi Aramco, one of the world's largest energy companies. The attack comes at the same time security firms ...
Tags: hacker group, Arab Youth Group, Saudi Aramcom, energy companies
A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today. Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at ...
Tags: Trojan horse, tracks, victim's computer, shamoon malware, Windows PCs
Shopping or banking online depends on trust. Individuals interact with sites that they trust, and sites have to trust the person who is transacting with them. Many online banking sites are turning to two-factor authentication to confirm ...
Tags: Banking fraud, education issue, online banking, trust
IDG News Service - A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination ...
Tags: malware, deletes entire partitions, deletes user files, CERTCC
After gathering analysis of targeted attack data collected between February and September this year, Trend Micro found that 91 percent of targeted attacks involved spearphishing. This finding reinforces the company’s stance that ...
Tags: Email attacks, Malicious threats, targeted attacks, Trend Micro, network
Sourcefire announced today it has strengthened and expanded its FirePOWER appliance family, providing users with the unmatched ability to protect against sophisticated malware, advanced persistent threats (APTs) and targeted attacks. One ...
Tags: advanced malware protection, advanced persisted threats, APT, firepower
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
By Gary Sandiford,Olive Group's Dubai based assessments manager.Olive Group is a leading provider of security and technology solutions and has operated continuously in Iraq since 2003. Overview Olive Groups Iraq statistics are ...
Tags: security, technology solutions, Olive Group, Protection
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Microsoft on Monday issued a security advisory that confirmed in-the-wild attacks are exploiting an unpatched bug in Internet Explorer. The software maker is working on a fix. The advisory addressed the “zero-day” ...
Tags: ie bug, Internet Explorer, Microsoft, patch, security
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
Criminals broke into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. As a result of the breach, the company will revoke the certificate next Thursday and will update ...
Tags: Adobe, Criminal, cyber crime, highlightedpost, malware