DarkHotel malware attacks target poorly secured networks, especially in hotels
The DarkHotel cyberespionage campaign making headlines now is not your typical advanced persistent threat (APT). According to a report released by Kaspersky Lab, a couple of key elements make...
View ArticleReport: IT pros are overly confident that they know how to prevent data breaches
It's been a rough year for businesses when it comes to data breaches. A new report from ThreatTrack Security suggests that things will improve dramatically in 2015—that is, unless the survey...
View ArticleThe Regin malware threat: Real protections against a mysterious danger
Regin, the latest malware threat, is also one of the more mysterious ones. When Symantec unveiled details of the new cyber espionage campaign last weekend, its researchers described it as a highly...
View ArticleData breach trends for 2015: Credit cards, healthcare records will be vulnerable
The data breaches of 2014 have yet to fade into memory, and we already have 2015 looming. Experian's 2015 Data Breach Industry Forecast gives us much to anticipate, and I've asked security experts to...
View ArticleBeware this online shopping scam: Fake order confirmations
During the holiday season it’s not unusual for both UPS and FedEx to show up at the Bradley household on an almost daily basis. We receive order confirmation and shipping notification emails for each...
View ArticleReport: iOS users care more about privacy and data security than Android users
You wouldn't think privacy and security were platform-specific, but data released by cloud storage service iDrive today seems to say that iPhone and Android users differ in this way as well as many...
View ArticleBox's Box Trust and Box EMM offer better BYOD security
Organizations may tolerate, accept or embrace BYOD—letting employees use their own mobile devices for business purposes—but they all struggle with the blurred line of protecting company data without...
View ArticleClean up your Wordpress plugins to avoid SoakSoak and other malware threats
Watch out for SoakSoak, a new malware threat that has compromised more than 100,000 Wordpress websites and led to more than 11,000 domains' being blacklisted by Google. Wordpress is a hugely popular...
View ArticleWhat the Sony hack can teach us about protecting our email
While the buzz around the Sony hack has shifted to the impact on free speech, and terrorist threats against movie theaters that dare to show the movie The Interview, there are many layers to the Sony...
View ArticleExperts pick the top 5 security threats for 2015
Massive, high-profile data breaches pockmarked 2014, culminating in the bizarre events surrounding the hack of Sony Pictures—allegedly by North Korea in retaliation for the politically incorrect...
View ArticleTravelers beware: Hackers are after your information
Frequent fliers get all the perks—and all the attention from cyber criminals, apparently. United Airlines, American Airlines, and Park-n-Fly have all reported breaches in the past few days, pointing...
View ArticleData breaches can be prevented with one simple solution
There have been so many major data breaches over the past year or two that it’s hardly even news anymore when millions of customer accounts are compromised. We’ve become jaded, and just expect that...
View ArticleObama supports cybersecurity and privacy, but experts warn of unintended impacts
President Obama called for strengthening cybersecurity and privacy protection in his State of the Union speech Tuesday. Most security experts agree with the President’s overall goals, but warn of...
View ArticleSelling passwords for $150, and other dumb ways users threaten corporate...
Corporate passwords for sale, $150 OBO. That, apparently, is how little some employees may take in exchange for compromising their company's security. SailPoint’s Market Pulse Survey, compiled from...
View ArticleNew phishing scam preys on fear of child sexual predators
Cyber criminals are always looking for vulnerabilities, and in this case, it’s parental instinct. A new phishing scam is disguised as an alert to child sexual predators. The scam email looks like a...
View Article5 things all Anthem customers should do after the massive data breach
Anthem customers, we feel your pain. The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting. Any breach...
View ArticleQuick! File your taxes before a hacker does it for you
It’s tax season! You might not want to put off filing your taxes this year. If you’re not quick, you might find that someone else has already filed a fraudulent tax return in your name.There are only...
View ArticlePassword security tips: When and how to share them safely with loved ones
We’re conditioned almost constantly to protect our passwords. Don’t write them down. Don’t store them in a Word doc on your desktop. Don’t share your password over the phone or by email. Don’t ever...
View ArticleOver a million Wordpress sites at risk thanks to WP-Slimstat plugin
Wordpress is one of the most popular Web publishing platforms. The vast catalog of plugins is part of what makes Wordpress so powerful, but it can also be the Achilles heel. According to security...
View Article3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them
Hillary Clinton is learning good BYOD policy the hard way. The former First Lady, Senator and Secretary of State (and presumptive Democratic front-runner for President in 2016) is taking heat for...
View ArticleMarch Madness inspires brackets, team spirit, and cyber crime
March Madness has begun for NCAA basketball teams—and for cybercriminals, who are getting ready for some games of their own. The extreme popularity of March Madness makes the event a prime target for...
View ArticleRun this Installer Hijacking Scanner app to see if your older Android phone...
This app could save your older Android phone from being hijacked. Specifically, the Installer Hijacking Scanner app from the Google Play store is designed to check for a vulnerability that was...
View ArticleRansomware alert: 'Pacman' scheme uses Dropbox link to gobble victims
All malware is bad, but ransomware is particularly insidious—ask any ransomware victim. That's why a new attack scheme called “Pacman” has raised alarms, because it's even nastier than usual. Think of...
View ArticleThe rise of sextortion: Nude selfies are fun until someone gets blackmailed
You don't have to be a celebrity to get nailed by a nude photo. According to a report by Trend Micro, sextortion—the use of compromising photos or videos to extract money from victims—is on the rise....
View Article