April 23, 2015 Research Suggests Being Hit by Mobile Malware Is as Rare as Being Struck by Lightning 2 min read - Damballa unveiled results of a two-year study at the RSA Conference that showed mobile malware threats may be overhyped — as rare as a lightning strike.
April 23, 2015 New Cyberattacks Put Public Officials’ Private Data at Risk 2 min read - New cyberattacks are putting public officials' private data at risk as cybercriminals use an informationg gathering technique known as doxing.
April 22, 2015 PayPal Suggests Biometric Identification Will One Day ‘Kill All Passwords’ 2 min read - A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification tools that protect users, PayPal says.
April 21, 2015 Google Ad Services Pushes for Near-Total Traffic Encryption to Fight Malvertising 2 min read - In response to growing incidents of malvertising, Google Ad Services has announced that the majority of its traffic will be encrypted by June 30.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.
April 16, 2015 Bee in Your Botnet: AAEH Disrupted by Law Enforcement Sting 2 min read - A joint international task force has disrupted the Beebone botnet (AAEH), but are users really safe from this type of polymorphic malware?
April 15, 2015 Annual Threat Report: POS, HTTPS and SCADA Attacks on the Rise 2 min read - An annual threat report on the biggest IT security issues says CISOs should be concerned about cybercriminals hitting POS, SCADA and HTTPS systems.
April 15, 2015 One-Man POS Malware Campaign Snags Data From More Than 22,000 Payment Cards 3 min read - A new POS malware family is being used to steal payment card data in Brazil and the United States, according to a recent report from Trend Micro.