Worldwide IT spending to grow 2.1 percent in 2014
Worldwide IT spending is on pace to total $3.7 trillion in 2014, a 2.1 percent increase from last year, however, this grow rate is down from earlier projections of 3.2 percent …
Western energy companies hit by state-sponsored hackers
Symantec researchers have confirmed the findings of their colleagues at F-Secure, who have been monitoring the spreading of the Havex malware family, and have put them in a …
Microsoft disrupts malware networks and APT operations
Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …
Number and diversity of phishing targets continues to increase
The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …
163k individuals affected in Butler Uni data breach
Personal and financial information of some 163,000 students, alumni, faculty, staff, and past applicants of Indianapolis-based Butler University have been stolen following a …
DDoS attacks are becoming more effective
Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …
Google Drive update fixes data-leaking flaw
Google has fixed a security issue that made some of the files stored on Google Drive and shared with friends or colleagues via a direct link potentially reachable by …
Banking malware sniffs out data sent over HTTPS
Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking …
The impact of IoT on IT infrastructure
Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity …
State of the Internet: Trends impacting online business
Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic …
Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …
How does a rogue ad network function?
It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?