Top 10 cloud myths

Posted on 28 October 2014.  |  Even with a mostly agreed on formal definition, multiple perspectives and agendas still conspire to mystify the subject ever more.

Tor exit node found patching downloaded binaries with malware

Posted on 27 October 2014.  |  The node was adding malicious code that made users' computers open a port to send HTTP requests to and receive commands from a remote server.

Ebola-themed emails deliver malware, exploit Sandworm vulnerability

Posted on 24 October 2014.  |  One of the most prolific campaigns is the one that impersonates the World Health Organization.

Attackers bypass Sandworm patch with new 0-day

Posted on 23 October 2014.  |  Attackers have discovered a way to bypass the patch and continue with their targeted attacks.

Koler worm spreads via SMS, holds phones for ransom

Posted on 22 October 2014.  |  A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid.

Spotlight

Most IT sec pros still rely on perimeter security to stop APTs

Posted on 27 October 2014.  |  78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 28th
Events
McAfee FOCUS 14
27 October - 29 October 2014.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions

28 October 2014. | Most US banks have yet to issue chip-based payment cards but some of them have already been fleeced via fraudulent chip-enabled transactions.

Automation is the key to successful policy implementation

28 October 2014. | With the explosion of data collection and the influx of information, previously effective approaches to monitoring and regulation of electronic data are becoming impractical.

Code Red: A global initiative for fighting government surveillance

27 October 2014. | Among other things, the initiative will support new projects aimed at creating effective, and "more tactically aggressive" countermeasures against surveillance.

Explaining infosec magic to kids

27 October 2014. | Magic! It’s the basis for countless children’s stories filled with adventure and excitement. It’s also how many kids think cyberspace works.

Most IT sec pros still rely on perimeter security to stop APTs

27 October 2014. | 78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats.

Attackers bypass Sandworm patch with new 0-day

23 October 2014. | The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted attacks.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //