Threats

JPMorgan Chase customers targeted in massive phishing campaign

JPMorgan Chase customers targeted in massive phishing campaign

By

Roughly 500,000 emails have been sent out so far as part of a massive multifaceted phishing campaign targeting customers of JPMorgan Chase.

Study: Organizations lack training, budget to thwart insider threats

Study: Organizations lack training, budget to thwart insider threats

By

Of the 355 IT and security professionals surveyed, a majority indicated that they were ill-equipped to thwart a possible insider threat.

FireEye examines popular Google Play apps, 68 percent have SSL flaws

FireEye examines popular Google Play apps, 68 percent have SSL flaws

By

The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.

Carbon Grabber crimeware kit being distributed in spam campaign

By

A spam campaign involving the Carbon Grabber crimeware kit is ongoing against the automotive industry in Europe, according to Symantec.

Errors in ZeroLocker means paying ransom may not decrypt files

By

A piece of ransomware known as ZeroLocker contains various errors that may prevent files from being decrypted even if the ransom is paid.

Study: Most higher ed malware infections attributed to 'Flashback'

Study: Most higher ed malware infections attributed to 'Flashback'

By

Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware.

Incapsula mitigates multi-vector DDoS attack lasting longer than a month

Incapsula mitigates multi-vector DDoS attack lasting longer than a month

By

Incapsula's scrubbing servers were able to filter out more than 50 petabits of malicious DDoS traffic aimed at a video game company for longer than a month.

'Machete' espionage campaign targets orgs in Venezuela, Ecuador

By

The campaign targets Spanish speaking victims, which also appears to be the native language of attackers.

Community Health Systems attackers exploited Heartbleed bug for access, firm says

Community Health Systems attackers exploited Heartbleed bug for access, firm says

By

Sources close to the breach investigation tipped off TrustedSec CEO David Kennedy.

CryptoLocker copycat, TorrentLocker, discovered by researchers

By

Yet another clone of the nefarious ransomware CryptoLocker has been detected by security experts.

Bug in iOS Instagram app fixed, impacts Facebook accounts

By

The vulnerability comes into play when Instagram users search for Facebook friends to "follow."

The 'human firewall': a more proactive approach to infosec

The 'human firewall': a more proactive approach to infosec

The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?

Chrome to warn users when downloaded software will make unexpected changes

By

Google's Safe Browsing service will be expanded to protect Chrome users from downloading and installing software that makes unexpected changes to a computer.

Phishing campaign lures victims with offer of IRS refund

By

A phishing campaign that mirrors earlier attacks lets victims choose the amount of an IRS refund.

Infection rate from Zeus variant grows 1,879 percent

Infection rate from Zeus variant grows 1,879 percent

By

Arbor Networks used data from five sinkholes to assess the threat posed by newGOZ, a Zeus variant that steals banking credentials from victims.

NSA works to automatically detect attacks, return strikes from foreign adversaries

NSA works to automatically detect attacks, return strikes from foreign adversaries

By

The NSA program, called "MonsterMind," is reportedly being developed by the intelligence agency.

Ransomware crooks claim private key database is for sale

By

SynoLocker attackers said the database of keys was available for $100,000.

Skimming con drains pension of retired officer in Philippines

By

The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.

Security movement urges automakers to collaborate with researchers

Security movement urges automakers to collaborate with researchers

By

A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.

Hacked Canadian ISP leads to virtual currency theft

By

A hacker that gained privileged access to a Canadian ISP's network hijacked net traffic from foreign networks to steal more than $83,000 in virtual currency.

Two new Gameover Zeus variants in the wild

Two new Gameover Zeus variants in the wild

By

About two months after botnet takedown efforts, new versions of the malware have surfaced in the U.S. and abroad.

Getting ahead on medical device security

By

In this video, Jay Radcliffe, senior security researcher at Rapid7, discusses his recent work and how the industry needs to get ahead of the game when it comes to medical device security.

Microsoft previews nine bulletins, critical fixes for Windows, IE ahead

Microsoft previews nine bulletins, critical fixes for Windows, IE ahead

By

Two critical fixes from the tech giant will plug RCE bugs impacting Windows and IE users.

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

By

Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.

Attack vectors and campaigns in 2014

By

In this video Teri Robinson sits with Jaime Blasco, director of AlienVault Labs, to discuss the prominent cyber criminal activity he and his team has witnessed this year.

Black Hat:"Saving cyberspace" requires next-level defense focus

Black Hat:"Saving cyberspace" requires next-level defense focus

By

Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.

Black Hat: Expert sheds light on government sponsored malware creation

Black Hat: Expert sheds light on government sponsored malware creation

By

F-Secure Chief Research Officer and acclaimed security expert Mikko Hypponen discussed the evolution of government-sponsored malware at Black Hat 2014.

Threat expert demos the 'Backoff' POS malware

By

Karl Sigler, Threat Intelligence Manager at Trustwave, discusses the Backoff point-of-sale malware that was recently uncovered by Trustwave in collaboration with government agencies like the Secret Service.

2014 threat trends discussed at Black Hat 2014

By

In this video interview, SC Magazine's Teri Robinson discusses the latest threat trends with Seculert CTO Aviv Raff at the 2014 Black Hat conference in Las Vegas.

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

By

An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings.

Sign up to our newsletters

POLL