Fahmida Y. Rashid

Wave Systems Launches Cloud-Based Encryption Management Platform

Wave Systems has launched a cloud-based encryption management service to help organizations enforce encryption policies on all laptops across the enterprise. The Wave Encryption Service (WES) supports multiple encryption technologies, including file- and folder-level software encryption and Microsoft Bitlocker, Wave Systems said Jan. 30. Organizations use the unified Web-based console to configure various policies and […]

Facebook Discloses Hacking, Spam as Business Risks in IPO Documents

Facebook outlined some of the security risks and compliance issues the company faces on the social networking platform and related services that could impact its operations in documents filed with the Securities and Exchange Commission. After months of intense speculation, Facebook filed S-1 documents with the SEC on Feb. 1 to raise a maximum of […]

Trojan Targets Industry, Government With Fake Conference Invitations

Researchers discovered malware that has been used in targeted attacks against defense contractors, government agencies and other organizations since early 2009, according to IT security companies Seculert and Zscaler. The email messages containing the malicious attachments masqueraded as fake conference invitations and targeted executives and government officials, Mike Geide, a senior security researcher at Zscaler […]

Investors Warned of Email Accounts Being Hacked to Illegally Transfer Funds

An independent regulator for securities firms has warned investors of a growing number of financially motivated attacks targeting email accounts. Malicious attackers are compromising user email accounts and sending trading instructions, the Financial Industry Regulatory Authority said in an investor alert issued Jan. 27. Similar warnings have been issued by the FBI and the Financial […]

IBM Rolls Out Endpoint Manager to Secure Mobile Devices, Laptops

IBM is beefing up its mobile credentials to help organizations manage the influx of mobile devices into the enterprises as part of the bring-your-own-device (BYOD) trend. IBM rolled out an endpoint manager for mobile devices running Apple iOS, Google Android, Nokia Symbian, and Microsoft Windows Mobile and Windows Phone mobile platforms, the company said Jan. […]

Rising Cyber-War Threat Forcing Nations to Bolster Defenses: McAfee

Cyber-security experts are concerned about the prospect of cyber-war and the growing number of cyber-threats, according to a recent report released by McAfee. Over half, or 57 percent, of cyber-security specialists surveyed in the “Cyber-security: The Vexed Question of Global Rules” report said a global arms race is taking place in cyberspace, McAfee said Jan. […]

Android.Counterclank an Aggressive Mobile Ad Network, Not Malware: Lookout

Despite Symantec’s warning to the contrary, Android.Counterclank is not malware, according to researchers at Lookout Mobile Security. Android.Counterclank is a botlike threat that can receive commands from remote servers to carry out certain actions, as well as steal information from infected devices, Symantec researcher Irfan Asrar wrote on the company’sSymantec Security Response blog Jan. 27. […]

Google, Microsoft Team Up to Fight Phishing, Spoofed Emails With DMARC

Google, Yahoo, Microsoft and other major email providers are committed to stomping out phishing attacks and other email-based Web scams. Major brands, such as Bank of America and Facebook, joined large email providers to announce Jan. 30 the new Domain-based Message Authentication, Reporting and Conformance framework along with an associated working group, DMARC.org. DMARC is […]

McAfee Updates Mobile Security With Remote Tracking, Data Wipes

McAfee introduced a new version of Mobile Security to protect smartphones and tablets from malicious applications and Web malware. Mobile Security 2.0 offers antivirus, anti-theft services and protection from malicious Websites and applications, McAfee said Jan. 30. The security software also includes online device management where users can remotely wipe data on the device and […]

Megaupload Data Subject to Deletion by Hosting Providers Feb. 2

All the photos, video and files stored on file-sharing site Megaupload could be permanently deleted from its servers sometime this week, according to federal prosecutors. Megaupload contracted with third-party hosting companies to store the actual files that users uploaded to the server. However, those providers have not been paid since the Federal Bureau of Investigation […]