WordPress sites hijacked via “free” premium plugins
If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …
Uncommon new worm targets Word and Excel files
Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …
Having a backup solution doesn’t prevent data loss
Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …
Challenges of running cloud-hosted applications
CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …
Analysis of three billion attacks reveals SQL injections cost $196,000
NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …
Does business understand IT security?
The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …
Cisco expands wireless LAN portfolio
Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …
Zorenium bot can now hit iOS users as well
If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …
Google: We didn’t access Arrington’s Gmail account to identify leaker
In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …
Cerberus app users warned about data breach
Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …
Hidden crypto currency-mining code spotted in apps on Google Play
You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …
Analysis of 244,703 DDoS incidents
NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations …