More than a decade after phishing attacks became the standard way of getting around corporate defences, all but a tiny minority of employees still fall for this kind of email, a McAfee test of UK-based workers has found.
John E. Dunn |
05 Sep |
Read more
The hackers who broke into iCloud accounts could have accessed revealing images and data users believed had been deleted weeks or even months in the past, an eagle-eyed Check Point Software researcher has suggested.
John E. Dunn |
04 Sep |
Read more
Security firm AVG has decided to splash $220 million (£135 million) on up-and-coming California-based mobile services firm Location Labs, the largest acquisition ever made by the European firm.
John E. Dunn |
04 Sep |
Read more
Hundreds of UK-registered companies were used for more than a decade as fronts for a huge data-stealing cyber-espionage campaign that targeted 300 SMBs in Germany, Austria and Switzerland, Israeli security startup Cybertinel has claimed.
John E. Dunn |
03 Sep |
Read more
The Democratic People's Republic of North Korea (DPRK) is a country with almost no conventional Internet presence and yet it has among the most active cyberwarfare footprints of any nation on earth and appears obsessed with expanding its operations, HP has concluded after reviewing evidence from a range of third-party sources.
John E. Dunn |
02 Sep |
Read more
Is ransom malware business on the wane at last? New figures from Dell SecureWorks suggest that the current market leader, CryptoWall, hasn't been as profitable as the infamous CryptoLocker despite infecting more PCs and holding hostage a staggering 5.25 billion files.
John E. Dunn |
31 Aug |
Read more
Most admins already know that Java and Adobe's Flash and Reader are the most vulnerable pieces of software on the average Windows PC. A new analysis from Heimdal Security suggests that while 2014 has been better than last year vendors and customers remains pretty snowed under by the number of vulnerabilities in these programs.
John E. Dunn |
28 Aug |
Read more
On 2 August, apparently for the first time ever, a hacking group coordinated a number of different reflection-style DDoS attacks against a single data centre, the mitigation firm involved, NSFOCUS, has confirmed.
John E. Dunn |
27 Aug |
Read more
Four Yorkshire-based SMEs had a lucky escape from the clutches of the CryptoLocker ransom malware after an IT services firm was able to restore their data from backups.
John E. Dunn |
27 Aug |
Read more
Europe's automotive supply chain is being targeted by a malware campaign connected to the increasingly popular Carbon Grabber crimeware kit, researchers at Symantec have warned.
John E. Dunn |
27 Aug |
Read more
The wizards of Tor are being fed bug reports by anonymous sources inside the agencies normally seen as trying to break its security, the NSA and GCHQ, the Project's executive director Andrew Lewman has claimed in a BBC interview.
John E. Dunn |
24 Aug |
Read more
The travel industry and large banks were the US industries most abused by spam and malicious email in the second quarter of 2014, according to Agari's Email TrustIndex.
John E. Dunn |
23 Aug |
Read more
US universities are still battling surprisingly high levels of malware infection among their student populations, mainly old forms considered neutralised years ago such as the Mac Flashback Trojan and Conficker worm, according to security firm BitSight Technologies.
John E. Dunn |
22 Aug |
Read more
Researchers have uncovered evidence that the infamous Zeus login-stealing Trojan has been blended with the Ramnit worm to create hybrid malware that can attack online bank accounts while spreading across networks.
John E. Dunn |
24 Aug |
Read more
The U.K. Government is developing a "toolbox" of Internet cyber-weapons that could be used to attack other countries, Armed Forces Minister Nick Harvey said in an admission that the military now treats the Internet as a battlefield like any other.
John E. Dunn |
01 Jun |
Read more