After a flawed AV update issued by McAfee left thousands of the security company’s customers scrambling to get their systems re-configured and back running normally, scammers have predictably moved to attempt to cash-in on the situation. As first reported by security researchers with ESET (a McAfee rival), malicious search engine optimization techniques are now being […]
As cybercriminals continue to advance their attempts to cash-in on end users’ sensitivity to potential security risks they’re increasingly combining time-honored social engineering schemes with phony desktop alerts and compromised URLs on legitimate sites to drive-up their likelihood of success. And while the idea is hardly revolutionary, as such blended techniques have long been the […]
Despite growing awareness that most of today’s unsolicited e-mail constitutes some form of attack, many people continue to open and interact with the spam they receive and expose themselves to the related risks for endpoint infection or personal data theft, researchers contend. According to the latest numbers published by the Messaging Anti-Abuse Working Group (MAAWG), […]
Based on the results of a survey conducted at last week’s RSA Security Conference in San Francisco, IT security pros are more concerned than ever regarding the resiliency of the software systems that their organizations use based on the availability of exploitable vulnerabilities in the programs. According to the survey of 200 RSA attendees carried […]
[Sometimes there just aren’t enough hours in the day, the week, or even the following weekend, to get to everything that you need to do. Sometimes you lose the power strip to your laptop and end up totally dead in the water at a major trade show. Luckily the content at last week’s RSA Security […]
This will be my fifth year in a row attending the annual RSA Security Conference in San Francisco and with the economy showing signs of life – particularly the IT security sector – I’m expecting that this year’s edition will be as fascinating and fast-paced as ever. Now, other true industry vets may scoff at […]
The 2010 iteration of the RSA Security Conference which opens Monday in San Francisco will feature an impressive array of influential government heavyweights among its featured keynote speakers. After the Obama Administration declined to deliver a specific strategy around cyber-security at RSA in 2009, it appears that a stronger message will be sent by government […]
How many social networking accounts do you have? Do you access them often? Have you set up profiles on multiple sites and then forgotten about them, or left others to wither on the vine after using them frequently for a time? While it may be impossible to completely prevent attackers from hijacking your accounts and […]
The electronic underground ecosystem has been firmly entrenched throughout nearly every corner of the planet for years, but new research highlights the fact that botnet command and control (CnC) infrastructure has truly become a pervasive and global phenomenon. In a recent study conducted by researchers at anti-botnet specialists Damballa, experts took a closer look at […]
A colleague of mine recently bought her husband a new Android device off of eBay. After receiving the $600 phone, she discovered that it may have been stolen by the person who sold it to her, but thankfully, she can fall back on PayPal’s buyer’s insurance to get her hard-earned money returned. According to researchers […]