The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
With the previously $40,000 Carberp Trojan's source code now freely available, experts expect exceptionally destructive variants of the malware to flow onto the Internet. Carberp-based malware is expected to take advantage of the bootkit ...
Tags: Computer Products, software
Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner. Ray Wagner, managing vice president of ...
Tags: Computer Products, software
Microsoft's apparent plan to automatically update its own Windows Store apps is drawing praise from security experts. "Auto-updating apps ... improve security and are great for anybody that does not have their own update or patch ...
System administrators and IT security pros can take bit of a breather: Microsoft issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes. "It's a boring Patch Tuesday this month, ...
Tags: Microsoft, Computer Products
Microsoft earlier this week quietly issued its first security update for one of its Windows 8 apps, patching a link-spoofing vulnerability in Mail. Two weeks ago, Microsoft spelled out plans for updating its own "Modern" apps, the flat UI ...
Tags: Windows 8, software, Computer Products
Microsoft will issue security fixes for its Windows Store apps on the fly, not just on the familiar monthly Patch Tuesday, the company said this week. At the same time, Microsoft spelled out how it will alert customers of security ...
Tags: APP, software, windows, Computer Products, Microsoft
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
Even after Oracle patched critical Java vulnerabilities on Monday, the U.S. Computer Emergency Readiness Team (US-CERT) continued urging users to disable Java browser plug-ins. "Due to the number and severity of this and prior Java ...
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
There are about 2.2 million people working as information security professionals today, says Hord Tipton, executive officer for security education and credentialing organization (ISC)2 and former CIO of the U.S. Department of the Interior. ...
CSO-In Windows 8,Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run,experts say.Windows 8 should also make it more difficult for people to unknowingly install malware in the first ...
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner