Analyzing fraudulent and high-risk behaviour events
NuData Security announced new threat intelligence that provides insight into the latest trends in online fraud.Account takeover, in which fraudsters steal an established …
Unmanaged Apple devices are a liability for corporations
While people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities, according to a new survey by …
Jimmy Wales confirmed as opening keynote speaker at IP EXPO Europe 2015
Jimmy Wales, entrepreneur and founder of Wikipedia, will deliver the opening keynote speech this year at IP EXPO Europe 2015, taking place at London’s ExCeL.At the event on …
Risky mobile behaviors are prevalent in the government
Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …
UDP-based Portmap latest target for DDoS attackers looking to amplify attacks
US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service …
Cybercriminals are becoming more creative
The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …
The rise of mobile transactions and online lending fraud
During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. …
Evaluating the security of open source software
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on …
The rise of artificial intelligence technologies
The advance of artificial intelligence (AI) technologies has caught the attention of companies and institutions in a wide range of enterprise markets, and executives in almost …
Security flaws could allow attackers to steal over 100 different cars
Since 2012, a trio of European researchers knew that the Megamos Crypto transponder – used in a over 100 cars manufactured by Audi, Ferrari, Fiat, Cadillac, Volkswagen …
Payment card info of 93,000 Web.com customers stolen
The name, address, and credit card information of approximately 93,000 customers of Web.com, a popular US-based provider of Internet services to small businesses, has been …
Most security executives lack confidence in their security posture
A new Raytheon|Websense survey of security executives at large companies in the U.S. reveals that confidence in their enterprise security posture is lacking.According to the …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online