A global shift in cybercrime
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
Two Winona State University students are currently being investigated by the Department of Homeland Security and are suspected of having been members of a Vietnamese-based …
There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …
An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …
Here’s an overview of some of last week’s most interesting news, articles and reviews: Google Apps Script API flaw allowed attacker to impersonate Google Details …
The wireless nature of the cellular networks makes them more susceptible to criminal attack, according to a Heavy Reading report. “If anything, our research suggests …
In this video, Bruce Schneier examined the future of cyberwar and cyber security. He explored the current debate on the threat of cyber war, asking whether or not the threat …
When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
When reading about instances of cybercrime, we often get caught in the numbers and think about the details of a particular attack or exploitation of a technology, and actually …