By Fred Touchette, AppRiver In today’s security landscape, email threats are one of the most common strategies utilized among cyber criminals. Much of the early spam traffic was annoying and essentially amounted to junk mail that consumed you and your company’s time. However, it wasn’t long before cyber criminals began using such messages to deliver […]
By Nazar Tymoshyk, SoftServe In today’s technology environment, the question is no longer if your business is vulnerable to cyber security threats or may be attacked someday. The question is when, and will you be prepared. Widespread use of cloud computing, software-as-a-service (SaaS) and smart devices leave businesses of all types and scales more vulnerable […]
Determining the return on investment for enterprise software is not always complicated. It’s fairly easy to determine the savings generated by using applications that remove time and/or manual steps from routine business processes. Calculating ROI for mobile device management solutions can be tricky, though, because MDM involves benefits that may not be easy to quantify. […]
Historically, the push for IT changes came from top-level executives and organizations provided employees with high-end computers that were well beyond the technology people had in their homes. Laptops are a great example of this – they entered the world in a top-down, calculated and directed fashion, which in turn put them under the […]
Nude photos of “Glee” star Heather Morris were recently posted online. “The naked pictures are alleged to have been stolen by hackers from the 25-year-old actress’s mobile phone,” writes Sophos’ Graham Cluley. “In November 2011, Christopher Chaney of Florida pleaded not guilty to hacking into the email and cellphones of some 50 people, including Scarlett […]
The porn site Digital Playground was recently hacked by The Consortium, exposing 72,794 customers’ user names, e-mail addresses and passwords, as well as more than 44,000 credit card numbers. “They did not dump the 44,663 credit card numbers that they claim to have acquired, but note that card numbers, card expiration date, cvv and all […]
A new botnet coded by TheGrimReap3r is currently nearing completion, and will soon be offered for sale on hacking forums for $8,000. “THOR does not use a central [command and control server],” Infosecurity reports. “It has a decentralized architecture based on peer-to-peer (P2P) technology. P2P botnets are the latest innovation in the battle between whitehat […]
Computer forensics firm Passware has released software capable of circumventing Apple’s FileVault disk encryption in under an hour. “Technology from Passware is reportedly capable of capturing the content of a Mac machine’s memory, via Firewire interfaces, before extracting encryption keys,” writes The Register’s John Leyden. “Passware’s software previously included the ability to extract Mac passwords […]
Hackers have successfully deployed the Kindle Fire’s Silk browser on other Android devices. “The hack requires a rooted device, and some mucking about with apk files, but does share the Silk love,” writes The Register’s Bill Ray. “XDA-Developers member TyHi initially hacked the Silk browser into the popular CyanogenMod Android distribution, but others have tested […]
A study [PDF file] conducted by Accuvant on behalf of Google has determined that Google Chrome is the most secure browser, thanks to its sandboxing tech. “The evaluation was based on the premise that anti-exploitation technology, such as sandboxing, reduces the vulnerability of a browser to a single exploit or an entire class of exploits,” […]
Subscribe to Cybersecurity Insider for top news, trends & analysis