Modular Corcow banking Trojan poised for success
Banking Trojans are among the most used stealthy malware, and the most popular ones are undoubtedly Zeus, SpyEye, Citadel and Carberp. Still, that doesn’t mean there is …
Transfer and backup content with a dual USB drive from SanDisk
SanDisk announced the SanDisk Ultra Dual USB Drive, a USB flash drive featuring both a micro-USB and a USB 2.0 connector in a sleek and sturdy form factor. It is designed for …
400Gbps NTP-based DDoS attack hits Cloudflare
Matthew Prince, CEO of content delivery network Cloudflare, has confirmed on Twitter on Monday that one of its customers was being targeted with a very big Network Time …
Google offers five grants to women in security to attend HITB2014AMS
As part of Google’s ongoing commitment to encourage women to excel in computing and technology, Google is offering five grants to women in security to attend the Hack In …
Exposing the profitability of private data
Security breaches, cyber criminals, and organized attacks made it nearly impossible to keep personal and financial data private, according to Trend Micro. This annual report …
Parents fear their kids are exposed to online threats
More than a quarter (27 per cent) of parents believe their children have been exposed to online risks, such as accessing inappropriate content or cyber bullying in the past 12 …
As crimeware evolves, phishing attacks increase
The number of phishing campaigns increased by more than 20 percent in the third quarter of 2013, with crimeware attacks evolving and proliferating, according to the APWG. The …
Microsoft patches critical vulnerabilities, secures IE
At first take, it looked like Microsoft would continue the 2014 trend of keeping patch Tuesday relatively light. There were only 5 advisories this month, two critical, three …
Security concerns holding back data center consolidation
Security concerns are preventing businesses from unlocking the potential benefits of data center consolidation and cloud services, according to SafeNet. The research, which is …
Older Flash Player vulnerability exploited in the wild
Microsoft researchers have also recently discovered several attacks in the wild exploiting another Flash Player vulnerability (CVE-2013-5330) on Windows, Linux and OS X. This …
Microsoft introduces multifactor authentication for all Office 365 users
In a praiseworthy move, Microsoft has extended the multifactor authentication option to all users of Office 365, its popular subscription-based online office software suite. …
DDoS attack toolkit simplifies the launch of large reflection attacks
Prolexic Technologies issued a high alert DDoS attack threat advisory on the DNS Flooder v1.1 toolkit. The toolkit makes it faster and easier for malicious actors to launch …
Featured news
Resources
Don't miss
- What types of compliance should your password manager support?
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email