Research

Travnet trojan compresses files to send more info to data thieves

By

The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

Latest Gozi trojan variant comes packaged with rootkit

By

Despite the arrests of Gozi ringleaders, the banking trojan still persists and is behind thousands of new infections in the United States.

Verizon study finds China-based groups behind 96 percent of espionage attacks

By

The landmark annual data breach report analyzed 621 breaches from caseloads across 19 organizations throughout the world.

Trojan uses "magic" code to infect organizations around globe

By

A trojan that uses a "magical" authentication code to communicate with its command-and-control server has compromised thousands of organizations around the globe. So far, however, it has remained largely silent.

"Watering hole" websites present largest innovation for targeted attacks

By

Symantec's annual "Internet Security Threat Report 2013" concentrated on the success attackers are attaining by sabotaging legitimate websites.

Study: Bing delivers five times as many infected sites as Google

By

German research institute AV-TEST conducted the study over a period of 18 months.

Bitcoin mining botnet has become one of the most prevalent cyber threats

Bitcoin mining botnet has become one of the most prevalent cyber threats By

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Web-based malware threats primary challenge for industry pros, survey says

By

Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.

New study finds malware variants skirting AV, mostly delivered via web

New study finds malware variants skirting AV, mostly delivered via web By

As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.

Members only: The Information Security Forum

By

Steve Durbin, global vice president for the Information Security Forum, discusses some of the problems security professionals face today.

Using new tactics, Asprox botnet goes unnoticed

By

Known for distributing postal-themed spam, the Asprox botnet has remained effective, though less noticeable due to evasion techniques.

The new fundamentals of security

The new fundamentals of security

We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.

Study finds that growth of security workers is needed, though budget constraints remain a hurdle

By

Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.

Malware once used exclusively for bank fraud is finding a new mission

By

Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.

Retail, food service industry top target of fraudsters

By

Attackers primarily want cardholder data, which can be easily bought and sold underground to commit fraud, according to security firm Trustwave.

One-fifth of malicious mobile websites are porn-related

By

In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.

New report urges security and privacy settings in networks

By

Behind the rallying cry, "Privacy equals freedom," Ontario's Information and Privacy Commissioner Ann Cavoukian struck a partnership with Oracle to celebrate International Privacy Day: Jan. 28.

Ethical hacking incident brings rewards and expulsion for Canadian college student

By

A young, Montreal-based computer science student, his former college and the institution's IT provider all found themselves thrust into the media spotlight over the student's stance on ethical hacking.

An IPS on steroids: MetaFlows Security System

An IPS on steroids: MetaFlows Security System By

The secret behind the MetaFlows Security System (MSS) is that it really is a hybrid application.

U.S. hosts most botnet command servers worldwide

By

The U.S. hosts 631 active command-and-control hubs for botnets, according to McAfee.

Gen Y online behaviors have broadened threats

By

A younger workforce exhibiting risky online behavior is a trend that does not bode well for IT management faced with widening threats.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.

DARPA seeking to grow DoD cyber defense

By

The "Cyber Targeted-Attack Analyzer" program would examine data sources across DoD's entire network to aid in threat detection.

Debate: Bug bounty programs

Debate: Bug bounty programs - offering monetary rewards to researchers - help make companies more secure.

Update fixes hole in Facebook Camera app

By

A bug report leads to an update in a Facebook app.

The ghosts of Microsoft: Patch, present and future

The ghosts of Microsoft: Patch, present and future

When you consider how many stakeholders are invested in Microsoft's Patch Tuesday, it's no wonder the monthly affair stirs up so much energy in the cyber world.

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."

Identity management

Identity management

Available solutions are challenged to detect and protect identity and authenticate users.

Advertisement

How to Prevent Insider Threats!

POLL