Research

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm RAT

By

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.

IEEE Computer Society shares top security design flaws

By

The group's Center for Secure Design released a report detailing how to avoid common design flaws.

Threat report on Swedish firms shows 93 percent were breached

By

The study by KPMG and FireEye also found that 49 percent of detected malware was unknown.

Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds

Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds

By

On Wednesday, HP TippingPoint released its State of Network Security survey which polled hundreds of professionals.

Study shows how attackers make use of websites existing for less than 24 hours

Study shows how attackers make use of websites existing for less than 24 hours

By

Looking at the top 50 of parent domains that produced websites existing for less than 24 hours, researchers with Blue Coat Security Labs observed that 22 percent were malicious.

IBM projects 2014 bug disclosures may hit three-year low

IBM projects 2014 bug disclosures may hit three-year low

By

The number of disclosed vulnerabilities is on track to fall below 8,000 this year, a first since 2011.

Researchers warn of backdoor in Netis, Netcore routers

By

The routers are sold in China under the Netcore brand name, and elsewhere as Netis products.

New variants of POS malware 'Backoff' found as infections expand

New variants of POS malware 'Backoff' found as infections expand

By

The Secret Service said that over 1,000 U.S. businesses have been infected with the malware.

FireEye examines popular Google Play apps, 68 percent have SSL flaws

FireEye examines popular Google Play apps, 68 percent have SSL flaws

By

The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.

Rogue AV scammers find success with new tactics

By

Although the number of rogue anti-virus malware campaigns have decreased overall, the threat isn't totally gone, according to researchers at Microsoft.

Study: Most higher ed malware infections attributed to 'Flashback'

Study: Most higher ed malware infections attributed to 'Flashback'

By

Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware.

With Black Hat and DefCon comes spike in Vegas-based attacks

By

A recent study found that the number of attacks during the two conferences increased to about 130 times the usual amount.

Volumetric DDoS activity up big-time in Q2 2014, report indicates

Volumetric DDoS activity up big-time in Q2 2014, report indicates

By

In the second quarter of 2014, Verisign researchers noted a spike in volumetric DDoS activity when compared to previous quarters.

Ransomware crooks claim private key database is for sale

By

SynoLocker attackers said the database of keys was available for $100,000.

Malware threatens virtual machines, according to report

Malware threatens virtual machines, according to report

By

Malware has become a threat to virtual machines and, nowadays, should be incorporated into security strategy, according to a Symantec report.

Two new Gameover Zeus variants in the wild

Two new Gameover Zeus variants in the wild

By

About two months after botnet takedown efforts, new versions of the malware have surfaced in the U.S. and abroad.

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

By

Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

By

An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings.

More than a billion unique credentials pilfered by Russian hackers

More than a billion unique credentials pilfered by Russian hackers

By

Hold Security identified a Russian hacker group, dubbed "CyberVor," that is in possession of more than a billion unique credentials.

PayPal addressing another two-factor authentication bypass

PayPal addressing another two-factor authentication bypass

By

An Australian researcher has discovered and posted a method for getting past PayPal's two-factor authentication, but it requires primary credentials.

Researchers still find iOS apps to be riskier than Android apps

By

A report reveals that 87 percent of the top paid iOS apps exhibit at least one risky behavior, whereas only 77 percent of the top paid Android apps did the same.

"Poweliks" downloads additional malware, abuses PowerShell

By

Poweliks abuses Windows PowerShell to try to remain undetected.

Android malware SandroRAT disguised as mobile security app

By

Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.

Free streams of 22 Jump Street, Transformers lead to adware, malware

By

Clicking on links to free streams of summer flicks such as 22 Jump Street and Transformers: Age of Extinction could lead to adware and malware.

About 2,800 victims of worldwide info-stealing campaign targeting various sectors

About 2,800 victims of worldwide info-stealing campaign targeting various sectors

By

Unknown attackers have claimed about 2,800 victims in an ongoing information-stealing campaign identified by Kaspersky Lab as "Crouching Yeti."

Study: CISO leadership capacity undervalued by most C-level execs

Study: CISO leadership capacity undervalued by most C-level execs

By

According to a ThreatTrack Security study, 74 percent of execs believed that CISOs didn't belong on organization's senior leadership teams.

Latest Citadel trick allows RDP access after malware's removal

Latest Citadel trick allows RDP access after malware's removal

By

Trusteer, an IBM company, said the new Citadel configuration was detected this month.

Nearly 600 U.S. businesses compromised by 'Backoff' POS malware

Nearly 600 U.S. businesses compromised by 'Backoff' POS malware

By

Attackers are brute-forcing remote desktop software to infect point-of-sale devices with relatively new malware known as Backoff.

A five-month-long Tor attack attempting to 'deanonymize' users

By

For roughly five months beginning in January, traffic confirmation attacks were used to attempt to "deanonymize" Tor users.

Sign up to our newsletters

POLL