Grum botnet makes a comeback
Last year’s takedown of the Grum botnet was one the most fascinating ones so far, as it triggered a quick response from the botherders who tried to derail law …
Cloud-based tool simulates social engineering
TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …
Activists now targeted with trojanized backdoor apps
Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …
New IronKey secure USB flash and hard drives
Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …
European ATM Security Team on fraud losses
European ATM Security Team (EAST) has published its first European Fraud Update for 2013. This is based on country crime updates given by representatives of 21 countries in …
Privacy-enhanced identity and authentication platform
SecureKey announced its cloud-based briidge.net identity and authentication platform – a solution that enables people to use devices and credentials they already have to …
Real-time apps and FTP are preferred malware targets
Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …
Targeted attacks and real world hacks
Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …
PrivacyScan expands cleaning support for Internet and desktop apps
PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …
Chinese university tied to “APT1” army cyber unit
By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …
Fake BBC emails lead to Blackhole, Zeus
Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …
Digital cameras easily turned into spying devices, researchers prove
Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …