The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
When hackers broke in to the New York Times’ network, evaded its anti-virus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: ?Anti-virus software is not that good at keeping systems secure. That means that any company that relies on an anti-virus package to secure its endpoints is exposing itself to…
Webroot’s Dancho Danchev reports that a new underground e-shop has been launched specifically to sell access to hacked PayPal accounts. “The E-shop is exclusively targeting United States citizens, and currently has an inventory of 1,543 hacked PayPal accounts, followed by another 14 for the United Kingdom,” Danchev writes. “The cybercriminals who sell the information provide…
Secure Sockets Layer/Transport Layer Security is the foundational technology that secures Web transactions and communications, but it is not infallible. New research dubbed Lucky13 reveals that SSL/TLS is at risk from a theoretical timing attack that could expose encrypted data. TLS headers include 13 bytes of data used for the secure handshake protocol, said…
Cisco recently published its 2013 Annual Security Report [PDF file], which states that the highest concentration of online security threats target legitimate Web sites rather than pornography, pharmeutical or gambling sites — online shopping sites are 21 times more likely to deliver malware than counterfeit software sites, and online advertisements are 182 times more likely…
In the beginning of the virus era, computer users were introduced to the concept of signature-based anti-virus scanners. It’s an idea whose time may well have come and gone. “Since the 1990s people have used signature-based scanners as their primary line of defense,” said Roger Thompson, chief emerging threats researcher at ICSA Labs, a research…
Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report [PDF file]. The report attributed fully 58 percent of all data stolen, more than 100 million records, to hacktivists. “The most significant change we saw in 2011 was the rise…
In a perfect world, we would all learn about preventing hack attacks before they happen. But sometimes the hack happens first and the lessons come second. This is the tale we are talking about today – based, in true Hollywood tradition, on a true story. The lead in this story is a mid-sized organization –…
Social media management company HootSuite recently acknowledged that e-mails sent to some users to warn them that their free trial of HootSuite Pro was about to end may have also included other users’ e-mail addresses, exposing the contact information of thousands of users. “Scores of HootSuite users have taken to Twitter to voice their displeasure…