Quantcast
Channel: PCWorld Threat Response
Browsing latest articles
Browse All 24 View Live

DarkHotel malware attacks target poorly secured networks, especially in hotels

The DarkHotel cyberespionage campaign making headlines now is not your typical advanced persistent threat (APT). According to a report released by Kaspersky Lab, a couple of key elements make...

View Article


Report: IT pros are overly confident that they know how to prevent data breaches

It's been a rough year for businesses when it comes to data breaches. A new report from ThreatTrack Security suggests that things will improve dramatically in 2015—that is, unless the survey...

View Article


The Regin malware threat: Real protections against a mysterious danger

Regin, the latest malware threat, is also one of the more mysterious ones. When Symantec unveiled details of the new cyber espionage campaign last weekend, its researchers described it as a highly...

View Article

Data breach trends for 2015: Credit cards, healthcare records will be vulnerable

The data breaches of 2014 have yet to fade into memory, and we already have 2015 looming. Experian's 2015 Data Breach Industry Forecast gives us much to anticipate, and I've asked security experts to...

View Article

Beware this online shopping scam: Fake order confirmations

During the holiday season it’s not unusual for both UPS and FedEx to show up at the Bradley household on an almost daily basis. We receive order confirmation and shipping notification emails for each...

View Article


Report: iOS users care more about privacy and data security than Android users

You wouldn't think privacy and security were platform-specific, but data released by cloud storage service iDrive today seems to say that iPhone and Android users differ in this way as well as many...

View Article

Box's Box Trust and Box EMM offer better BYOD security

Organizations may tolerate, accept or embrace BYOD—letting employees use their own mobile devices for business purposes—but they all struggle with the blurred line of protecting company data without...

View Article

Clean up your Wordpress plugins to avoid SoakSoak and other malware threats

Watch out for SoakSoak, a new malware threat that has compromised more than 100,000 Wordpress websites and led to more than 11,000 domains' being blacklisted by Google. Wordpress is a hugely popular...

View Article


What the Sony hack can teach us about protecting our email

While the buzz around the Sony hack has shifted to the impact on free speech, and terrorist threats against movie theaters that dare to show the movie The Interview, there are many layers to the Sony...

View Article


Experts pick the top 5 security threats for 2015

Massive, high-profile data breaches pockmarked 2014, culminating in the bizarre events surrounding the hack of Sony Pictures—allegedly by North Korea in retaliation for the politically incorrect...

View Article

Travelers beware: Hackers are after your information

Frequent fliers get all the perks—and all the attention from cyber criminals, apparently. United Airlines, American Airlines, and Park-n-Fly have all reported breaches in the past few days, pointing...

View Article

Data breaches can be prevented with one simple solution

There have been so many major data breaches over the past year or two that it’s hardly even news anymore when millions of customer accounts are compromised. We’ve become jaded, and just expect that...

View Article

Obama supports cybersecurity and privacy, but experts warn of unintended impacts

President Obama called for strengthening cybersecurity and privacy protection in his State of the Union speech Tuesday. Most security experts agree with the President’s overall goals, but warn of...

View Article


Selling passwords for $150, and other dumb ways users threaten corporate...

Corporate passwords for sale, $150 OBO. That, apparently, is how little some employees may take in exchange for compromising their company's security. SailPoint’s Market Pulse Survey, compiled from...

View Article

New phishing scam preys on fear of child sexual predators

Cyber criminals are always looking for vulnerabilities, and in this case, it’s parental instinct. A new phishing scam is disguised as an alert to child sexual predators. The scam email looks like a...

View Article


5 things all Anthem customers should do after the massive data breach

Anthem customers, we feel your pain. The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting.  Any breach...

View Article

Quick! File your taxes before a hacker does it for you

It’s tax season! You might not want to put off filing your taxes this year. If you’re not quick, you might find that someone else has already filed a fraudulent tax return in your name.There are only...

View Article


Password security tips: When and how to share them safely with loved ones

We’re conditioned almost constantly to protect our passwords. Don’t write them down. Don’t store them in a Word doc on your desktop. Don’t share your password over the phone or by email. Don’t ever...

View Article

Over a million Wordpress sites at risk thanks to WP-Slimstat plugin

Wordpress is one of the most popular Web publishing platforms. The vast catalog of plugins is part of what makes Wordpress so powerful, but it can also be the Achilles heel. According to security...

View Article

3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them

Hillary Clinton is learning good BYOD policy the hard way. The former First Lady, Senator and Secretary of State (and presumptive Democratic front-runner for President in 2016) is taking heat for...

View Article

March Madness inspires brackets, team spirit, and cyber crime

March Madness has begun for NCAA basketball teams—and for cybercriminals, who are getting ready for some games of their own. The extreme popularity of March Madness makes the event a prime target for...

View Article


Run this Installer Hijacking Scanner app to see if your older Android phone...

This app could save your older Android phone from being hijacked. Specifically, the Installer Hijacking Scanner app from the Google Play store is designed to check for a vulnerability that was...

View Article


Ransomware alert: 'Pacman' scheme uses Dropbox link to gobble victims

All malware is bad, but ransomware is particularly insidious—ask any ransomware victim. That's why a new attack scheme called “Pacman” has raised alarms, because it's even nastier than usual. Think of...

View Article

The rise of sextortion: Nude selfies are fun until someone gets blackmailed

You don't have to be a celebrity to get nailed by a nude photo. According to a report by Trend Micro, sextortion—the use of compromising photos or videos to extract money from victims—is on the rise....

View Article
Browsing latest articles
Browse All 24 View Live