HomeBlogsSecurity Watch

Security Watch

Is Economic Turmoil Really Driving Threats?

Security researchers are starting to hammer home the idea that the current economic climate is resulting in higher volumes of malware and phishing attacks.As...

McColo Shutdown Strands Tons of Zombies

Researchers are finding hundreds of thousands of stranded bots hopelessly attempting to connect to command and control centers that were taken offline when shady...

Online Malware Goes Vertical

Web-based malware attacks are increasingly being targeted at specific vertical markets, security researchers contend, with certain sectors finding themselves in the crosshairs far more...

Insider Threat Driving Many Data Loss Events

Cisco published the final installment of its comprehensive study into data leakage trends last week, with the latest results highlighting the continued contribution of...

Network Attacks Increase in Volume, Size, Sophistication

Malicious attacks carried out directly against networking infrastructure have taken off in nearly every sense over the last year, according to the latest report...

NSF-funded Anti-Malware Vendor Launches

I don't tend to cover much vendor activity here in the blog, but an interesting new anti-malware applications provider officially brought its initial product...

Is Spam Really Slipping?

Add MX Logic to the growing list of messaging security specialists charting a noticeable downturn in the overall level of spam e-mail that they're...

Critical Infrastructure Unprepared for Attacks

I had the opportunity to spend some time last week with Tom Kellermann, a member of the Commission on Cyber Security for the 44th...

New Malware Family Took Off in October

According to Sunbelt Software's monthly listing of the most ubiquitous malware and spyware attacks, an entirely new family of threats emerged rapidly during October.Based...

Campaign Hacks Highlight Cyber-espionage

The security world is abuzz with news today that both the Democratic and Republican presidential campaigns had their IT systems hacked and infiltrated in...