Malware

Data-Mining for Zero-Day Vulnerabilities

Zero-day exploits can lurk for months in IT infrastructures before being discovered. continue…

U.S. Companies Aren’t Stopping Malware: Survey

Posted In DataCenter
Don’t blame employees: IT and top managers carry at least as much blame for attacks. continue…

Google Adds Malware Data to Transparency Report

Bottom line: Despite security companies’ best efforts, the Internet is still a very unsafe place. continue…

Microsoft, FBI Take Down Citadel Botnet Network

Posted In Cloud
Those responsible for taking the network down claim it was responsible for $500 million in losses. continue…

Ways AP Could Have Avoided Its Twitter Hack

AP Hack T
A single tweet with a phony bit of news sent the stock market into a brief dive Tuesday, pushing the Dow Jones Industrial Average down more than 140 points in the three minutes from 1:07 to 1:10 p.m. ET. When the “news” — that two bombs had exploded in the White House, injuring the president — was debunked, the market regained its footing.   Of course, phony information blasts out through Twitter all the time. The difference here is that… continue…

The Security Implications of Fake Twitter Followers

Twitter Logo
A recent New York Times story about the fake Twitter follower community got me thinking. The newspaper claims that this is a $1 million industry, with followers being purchased in bulk for about a penny a head. Why does Twitter tolerate this? Certainly, the company could easily fix this problem with some clever software engineering. Instead, they’re turning a blind eye. But on further reflection, it’s not something that’s easy to fix. I have a Twitter account that I set… continue…

The Good New Days of Cloud Security

Posted In Cloud
The cloud could have some great things going for it with respect to security concerns. continue…

Chameleon Clickjacking Botnet Stealing $6 Million a Month

Posted In DataCenter
A collection of hijacked PCs is fooling online ad networks into paying for what its servers consider legitimate Web traffic. continue…

Android Malware Attacks on the Rise

Posted In Cloud
Malware attacks on Android mobile devices are a small but growing phenomenon, says Blue Coat. continue…

IT Security: When Protection Becomes Prohibitive

Security is sold as a protective measure and discussed as an enabler of productivity. But what happens when security starts hindering work? continue…