Top 10 cloud myths
Posted on 28 October 2014. | Even with a mostly agreed on formal definition, multiple perspectives and agendas still conspire to mystify the subject ever more.
Tor exit node found patching downloaded binaries with malware
Posted on 27 October 2014. | The node was adding malicious code that made users' computers open a port to send HTTP requests to and receive commands from a remote server.
Ebola-themed emails deliver malware, exploit Sandworm vulnerability
Posted on 24 October 2014. | One of the most prolific campaigns is the one that impersonates the World Health Organization.
Attackers bypass Sandworm patch with new 0-day
Posted on 23 October 2014. | Attackers have discovered a way to bypass the patch and continue with their targeted attacks.
Koler worm spreads via SMS, holds phones for ransom
Posted on 22 October 2014. | A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid.
Spotlight
Most IT sec pros still rely on perimeter security to stop APTs
Posted on 27 October 2014. | 78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats.
How-to guide to protecting yourself from electronic spying
Posted on 24 October 2014. | The Electronic Frontier Foundation (EFF) launched its updated how-to guide to protecting yourself from electronic spying for Internet users all over the world.
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
Posted on 23 October 2014. | Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.
Windows 0-day exploited in ongoing attacks, temporary workarounds offered
Posted on 22 October 2014. | A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.
Lessons learned developing Lynis, an open source security auditing tool
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.





























