Arrests of money mules follow ZeuS gang takedowns
Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …
The U.S. leads in malicious URLs
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the “Top Producer of …
XSS flaws found on three security firms’ websites
A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms …
Cyber security report reveals Feds’ take on FISMA 2.0
A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act’s (FISMA) online …
QualysGuard integrates with Cyber-Ark’s Privileged Identity Management Suite
Qualys and Cyber-Ark announced QualysGuard integration with Cyber-Ark’s Privileged Identity Management (PIM) Suite. With this integration, customers can store and manage …
CSC acquires Vulnerability Research Labs
CSC has acquired the business of Vulnerability Research Labs (VRL), a privately held cyber threat intelligence firm. The acquisition enables CSC to enhance its cybersecurity …
Plane-tracking phone app is a boon for terrorists?
An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it …
The state of compliance
While credit card data breaches remain all too common, a new report from Verizon Business shows that following industry security standards can dramatically reduce such …
Week in review: Stuxnet, WoW phishing and ZeuS gangs smackdown
Here’s an overview of some of last week’s most interesting news, videos, articles and interviews: 60% of organizations suffered $2 million losses for Web 2.0 …
We are two clicks away from malware
Most Internet users are only two clicks away from malicious content from top sites, poisoned search results, and malicious links, according to Websense. The path to malware …
Android applications sharing your data
A group consisting of researchers from Duke University, Pennsylvania State University and Intel Labs has recently created a tool that allowed them to analyze data flows out of …
Host-based IDS OSSEC 2.5 released
The OSSEC team announced the general availability of OSSEC version 2.5. What’s new? Added support for “report_changes” on syscheck to show what was changed …