The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus
TUESDAY, MAY 26, 2015

Latest Comments

Social Networks

    After having first denied that they suffered a breach and had their customer’s #data stolen and leaked on the Dark Web, mobile spyware maker #mspy has finally admitted that the incident happened, but they claim that only 80,000 customers (and not 400,000) have been affected. Brian Krebs, who was pointed towards the leaked data last […]

    Read more ...

    Cybercriminals have developed a web-based attack tool to hijack routers on a large scale when users visit compromised websites or view malicious advertisements in their browsers. The goal of these attacks is to replace the DNS servers configured on routers with rogue ones controlled by attackers. This allows hackers to intercept traffic, spoof websites, hijack […]

    Read more ...

    “#threat intelligence is useless to most organizations if all it does is generate more alerts,” said Webroot CMO David Duncan is a recent Q&A. “Threat intelligence has to detect threats in real time,” and its “sole purpose should be to accurately detect and proactively block any threat that is coming across the network, or directly […]

    Read more ...

    Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders. The effects of insider threats are simply too big to ignore. In the most recent year on record, U.S. […]

    Read more ...