Cybercriminals are switching tactics, a leading security body has warned – and the combination of anonymisation technologies, mobile devices, and social media attacks could lead to cyberattacks with a “large impact”.
A stealthy banking Trojan known as Caphaw or Shylock has resurfaced – and is attacking customers of 24 American banks. It’s armed with defensive abilities including the power to “restore” itself during shutdown.
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
Malware, phishing and ID thieves are everywhere – but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.
A picture of a smooching couple actually delivers a kiss of death to Mac OS X users – it’s a new Mac Trojan which opens a backdoor on users’ machines. It’s the second piece of Mac malware detected in a week.
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.
Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer – warning that targeted attacks are already attempting to exploit it.
A hacked card reader – similar to the ones used in shops and restaurants – is on sale on Russian forums for $2,000, and can “text” details including PIN numbers to cybercriminals, who empty bank accounts in three hours using teams of money-launderers.
“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection – even by advanced inspection systems using optical microscopes.
Cybersecurity insurance or “cyber insurance” was a hot topic at the latest NIST workshop on the critical infrastructure cybersecurity framework (CSF) in Dallas. Will the CSF become a standard used by insurers to determine rates?
With malicious remote access attacks of the rise it is time to check your computer’s RDP configuration and apply restrictions, like turning it off, limiting users,and applying strong passwords.
A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University – and even prevent carjackings, drunk driving, or accidents caused by drivers falling asleep.
Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods department store were used as “bait”.
Iron Mountain claims that up to two-thirds of employees work from home in Europe at least part of the time – but a mere 18% of firms offer guidance on how to protect information outside the office.
A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and shared on the Virus Total website, where security researchers show off new “finds”.
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.
“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.
These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.
What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” – a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda’s fell victim, with attackers compromising Hootsuite accounts to gain entry.