Crypto ransomware sightings and trends for Q1 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the …
What’s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment …
Don’t just deploy a backup solution and hope for the best
Employing a backup solution does not entirely eliminate data loss, according to Kroll Ontrack. The 2015 survey of customers who lost valuable computer data confirms that the …
Feds subpoena Reddit for info on DarknetMarkets subreddit users
A US Immigrations and Customs Agency (ICE) special agent has recently issued a subpoena to popular social news site Reddit, asking them to share the information they might …
WordPress sites compromised to redirect to Pirate Bay clone, exploit kit
Malwarebytes researchers have spotted another malware delivery campaign that uses compromised WordPress sites to redirect users to a page hosting an exploit kit. The total …
Malware posing as MyTeamVoice app spread via Steam chat
Scammers are once again misusing the gaming platfrom Steam’s chat feature to spread malware, Malwarebytes warns. They send gamers a message with a link to a page (at …
Firefox 37 enhances security
Mozilla has released Firefox 37.0. This update includes security fixes for four critical, two high, five moderate and one low impact vulnerability. Among the new and changed …
Consumers would sell personal information for a price
Consumers crave privacy, but do not typically alter actions to protect themselves, according to a global study conducted by the Ponemon Institute. A slight majority of …
Cyber threat intelligence: Perception and use
Most companies believe threat intelligence is essential for a well-rounded cybersecurity defense and has proven effective in stopping security incidents, according to a survey …
Companies now have 1,555 partners in the cloud
Security does not end at the corporate perimeter. After vendors served as entry points in recent high-profile breaches, security vulnerabilities associated with partners have …
French, Italian users targeted with judicial-themed spam leading to malware
Trend Micro researchers are warning about a clever and very well executed email spam campaign that has been targeting and continues to target French users with the goal of …
How security pros deal with cybercrime extortion
1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files, according to ThreatTrack Security. …
Featured news
Resources
Don't miss
- European police busts Ukraine scam call centers
- SoundCloud breached, hit by DoS attacks
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)