Please turn on your JavaScript for this page to function normally.
GPS faker software broadcasts spam across thousands of fake profiles

Different from traditional email spam, social spam can reach a large audience by nature of the platform and can appear trustworthy since it is coming from people in your …

Four ways an attacker can infiltrate an organization by diverting security solutions

Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …

ModPOS: The most sophisticated POS malware to date

Elements of ModPOS date back as far as early 2012. It targeted US retailers in late 2013 and throughout 2014, and is expected to continue to do so in the future. According to …

Two arrested for helping malware developers evade AV software

Two suspects have been arrested on suspicion of operating a website offering services to help criminals overcome and avoid anti malware software, following a joint …

Most consumers concerned about becoming victims of online crime

Globally, 62 percent of consumers believe it’s more likely their credit card information will be stolen online compared to only 38 percent who think it’s more likely they will …

Man stole special agent’s identity, executed a complex identity theft scheme

Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …

How online fraud will evolve in 2016

While 2015 is drawing to a close, the security fraud community is preparing for more battles ahead in 2016. And next year, consumer-facing web and mobile apps are up against a …

40% of companies expect a data breach next year

Clearswift released their annual Clearswift Insider Threat Index (CITI) exploring why firms have been slow to address internal security threats and including data from …

How fake users are impacting business through acts of fraud and theft

A new report by The Ponemon Institute highlights the average economic value of a company’s user base ($117M) and the financial and brand reputation damage that can be done if …

Cracks in the mobile ecosystem, Internet-connected devices

The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …

Exploit kit activity up 75 percent

The creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in the third quarter of 2015 from the same period in 2014, according to …

Will 2016 mark the end of the Advanced Persistent Threat?

Advanced Persistent Threats (APTs) as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to detect and trace back to the …

Don't miss

Cybersecurity news