Archive

Report: Botnets Help Bump Cyberattack Attempts by 20 Percent

ThreatMetrix last week reported that it had detected and prevented more than 90 million attempted cyberattacks in real time across industries from July to September. The attempted attacks covered fraudulent online payments, logins and new account registrations, and represented a 20 percent increase ...

SPOTLIGHT ON SECURITY

Hackers Home in on Health, Education, Government Sectors

A New York healthcare provider, California's higher education system and the U.S. Department of Energy have become the latest targets of data bandits. The latest massive data breach at a healthcare provider reportedly took place at Excellus BlueCross BlueShield, which last week revealed that the per...

SPOTLIGHT ON SECURITY

Netflix Move Prompts Premature Antivirus Software Obit

Netflix reportedly is in the process of dumping its antivirus software and placing all its faith in an alternative solution to protect its more than 60 million subscribers from online nastiness, a move that prompted one pundit to pronounce the death of antivirus software yet again. Such dire pronoun...

Security Pros Shine Light on Shadowy Cyberspy Ring

A highly sophisticated group of hackers who use cutting-edge techniques to shield their attacks from detection has been bedeviling corporations around the world for several years. The group, which Symantec dubbed "Morpho" and Kaspersky Lab calls "Wild Neutron," has hit multibillion-dollar corporatio...

US, Brit Spooks Bedevil Security Software

The United States' National Security Agency and the UK's Government Communications Headquarters reportedly have been attacking antivirus and other security software since at least 2008. The aim is to infiltrate networks and track users. The agencies apparently have reverse-engineered security and an...

China’s Great Cannon Could Point Anywhere When Next Fuse Is Lit

China has a new censorship tool that is causing alarm. It's known as the "Great Cannon." The University of Toronto's Citizen Lab identified the tool in a report released last week. The Great Cannon was first used in March, to launch a large-scale DDoS attack on GitHub and GreatFire.org, Citizen Lab ...

SPOTLIGHT ON SECURITY

Opening Windows Source Code Could Improve Security

Microsoft Technical Fellow Mark Russinovich raised a few eyebrows at ChefCon earlier this month, when he aired the possibility of Windows becoming an open source program. Sure, Microsoft's attitude toward the open source movement has mellowed over the years, but the prospect of the company rubbing e...

Proposed Amendments to US Cybersecurity Laws Under Scrutiny

The White House in January proposed updates to the Computer Fraud and Abuse Act that have stirred controversy within the cybersecurity industry. The proposals would allow prosecution under the CFAA of insiders who abuse their ability to access information, while setting aside insignificant conduct.

SPOTLIGHT ON SECURITY

Malicious Emailers Find Healthcare Firms Juicy Prey

Healthcare providers have garnered growing interest from hackers in recent months. More evidence of that trend appeared last week in a report on email trust. An email that appeared to come from a healthcare company was four times more likely to be fraudulent than an email purportedly from a social m...

Cyberthieves Bag a Billion in Snail-Speed Bank Heists

Criminals using Carbanak malware have stolen up to $1 billion from 100 financial institutions in Russia, China, Germany and the United States, Kaspersky Lab has revealed. The gang is expanding operations to other countries. Kaspersky has advised financial institutions to scan their networks for intr...

Developing Best Practices to Combat ID Theft, Part 2

Approximately 10 million Americans fall victim to identity theft each year, a statistic that is expected to increase despite the diligent efforts of government and institutions to turn the tide. Leading IT security providers are arguably in the best position to understand the nature and scale of the...

Developing Best Practices to Combat ID Theft, Part 1

Unfortunately, it is now easier and cheaper than ever for those bent on illicit gain to use the Internet to obtain the private, personal information necessary to impersonate you online -- the first step for cybercriminals to gain access to your financial information. "Online identity theft is going ...

How will consumers react to Apple's WWDC 2023 announcements?
Loading ... Loading ...

LinuxInsider Channels