Stay informed on the latest cybersecurity threats and news to better protect your data, networks, applications, and devices. Our coverage includes emerging vulnerabilities, evolving attack techniques, and the latest security breaches to help you understand and mitigate risks.
Validating the integrity and authenticity of code in Microsoft applications is important given their near-ubiquity in the enterprise. One mechanism for doing so is a digitally signed file that is supposed to help Windows operating systems run validated code from known good developers. One problem: The mechanism can potentially be bypassed and an attacker can…
LAS VEGAS. Guests in hotels around the world make use of magnetic stripe-based key cards to gain access to their rooms. According to Weston Hecker, senior security engineer and pentester at Rapid7, all of those cards pose a security risk as there are weaknesses that could enable an attacker to modify cards for malicious purposes.…
In the summer of 2008, my Black Hat USA experience was dominated by a single topic, from a single speaker, Dan Kaminsky and his big DNS flaw. On July 8, 2008, Kaminsky made a big splash announcing that he had found a huge flaw in the internet and that he had brought together the…
The U.S. Securities and Exchange Commission (SEC) has charged 32 people with involvement in a scheme to hack into the newswire services Marketwired, PR Newswire and Business Wire in order to steal hundreds of corporate earnings announcements before they were publicly released. Two Ukrainian men, Ivan Turchynov and Oleksandr Ieremenko, have been charged with hacking…
Europol recently announced that a joint international operation had successfully dismantled a cybercriminal group active in Belgium, Georgia, Italy, Poland, Spain and the U.K., which had been responsible for international fraud totaling 6 million Euros over a very short period of time. “The modus operandi used by this criminal group is the so-called man-in-the-middle and…
According to investigative reporter Brian Krebs, the same cybercriminals thought to have been behind the credit card breaches at Target and Home Depot appear to have recently breached the U.S. airport parking service OneStopParking.com. The Rescator cybercrime shop, which was the first to sell payment cards stolen from Target and Home Depot, recently began selling…
By Fred Touchette, AppRiver In today’s security landscape, email threats are one of the most common strategies utilized among cyber criminals. Much of the early spam traffic was annoying and essentially amounted to junk mail that consumed you and your company’s time. However, it wasn’t long before cyber criminals began using such messages to deliver…
Japan Airlines (JAL) recently acknowledged that the personal information of as many as 750,000 members of its JAL Mileage Bank (JMB) frequent flyer club may have been stolen when hackers breached the airline’s Customer Information Management System after installing malware on computers that had access to the system. The data potentially accessed includes names, birthdates,…
The rising popularity of whitelisting boils down to simple math. With a relatively small number of malware items, it made sense to compile known virus signatures to detect and prevent infection. But with a huge increase in the volume of viruses and other forms of intrusion, it isn’t easy to keep virus signatures up to…
In the world of IT security, threats are constantly evolving and shifting. It’s critical to stay abreast of the current (and hopefully future) threat landscape. If you’re not staying current, then you’ve already lost. Keeping up to date with security threats will help you mount more effective defenses and also help you educate your…