Over 45% of IT pros snitch on their colleagues
Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …
Form-grabbing rootkit sold on underground forums
There seemingly no end to the automated tools that aspiring cyber crooks can buy on underground forums. The latest of these discovered by Webroot’s Dancho Danchev is …
U.S. DOD decides iPhones and iPads can connect to its networks
The Defense Information Systems Agency (DISA) of the U.S. Department of Defense has approved the use of government-issued iOS 6 devices when connecting to its military …
Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Barracuda updates web application firewall
Barracuda Networks announced Barracuda Web Application Firewall 7.8, specifically aimed at reducing the impact of automated attack attempts from botnets. Automated botnet …
Week in review: Human sensors, IT security jobs, and hacking car charge stations
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Police unable to decrypt iPhones, asks Apple to do it Court …
“Get free followers” scam targets Instagram users
If a service is popular, you can be sure that scammers and spammers will find a way of targeting as many of its users as they can. Trend Micro fraud analyst Karla Agregado …
New Mac spyware signed with legitimate Apple Developer ID
A new piece of malware designed to spy on Mac users has been unearthed by security researcher and hacker Jacob Appelbaum at the Oslo Freedom Conference held this week in …
Ransomware adds password stealing to its arsenal
Slowly but surely, more and more users are becoming acquainted with the existence of ransomware and when faced with one, they opt not to pay the requested “fine” …
Targeted data stealing attacks using fake attachments
ESET has uncovered and analyzed a targeted campaign that tries to steal sensitive information from different organizations, particularly in Pakistan (with limited spread …
A look into the EC Council hack
Update: Wednesday, 22 May 2013 – Tal Be’ery: “We had analyzed a screenshot of what we had thought at the time the current EC council site hack. Later we had …
Four LulzSec hackers handed prison sentences
Four LulzSec members have been sentenced today at Southwark Crown Court for taking part in the 2011 attacks against a series of high-profile websites and publishing user …