Chinese sources have long been linked with scads of worldwide malware and spam campaigns, but new research contends that computers located in the nation are currently generating an overwhelming proportion of the world’s unsolicited e-mail. According to a report compiled by researchers at the U.S.-based University of Alabama at Birmingham (UAB), Chinese infrastructure is accounting […]
Applications whitelisting technologies are gaining rapid adoption based on that fact that the tools serve as an ideal foil to the challenges that plague defensive IT security measures, and the ability of the products to integrate with memory-limited computing platforms such as SCADA control systems, backers of the solutions claim. As “blacklist” preventative AV controls […]
With all the focus that’s been placed on external hacking and malware threats, most CISOs are actually more concerned with insider attacks when it comes to defending their organizations against potential data theft, according to a recent survey. Unsurprising in the sense that privileged insiders are those who know exactly where an organization’s electronic crown […]
I have to think that somewhere at this moment Richard Stallman is either laughing or crying, or at least scratching his head. Stallman, of course, is not only the founder of the Free Software Foundation and all around computing pioneer, but he’s also known to have been one of the world’s first hackers at MIT […]
Lest anyone should think that attacks like the Gumblar botnet redirection campaign are something of a rare bird, researchers are noting the use of similar “mass injection” propagation techniques in following waves of malware. Experts at Sophos report that they’ve been following an entire “series” of such attacks in recent weeks. And oh yeah, Gumblar […]
Long revered as the operating system that deterred malware attacks based on its sheer fortitude, Apple’s OS X continues to be targeted more frequently by malware schemers, with two new samples emerging just this week. Researchers at AV giant Trend Micro reported the discovery of a pair of emerging Trojan threats that seek to trick […]
Researchers at Symantec report that they’ve seen a spike in spam over the last six weeks, driven in part by traditional pharmaceutical themed messages, and also by a rather new technique, that being, blank e-mails. That’s right, having exhausted (seemingly) every angle on erectile dysfunction, having used every variation of celebrity video site, spammers are […]
With so much online fraud aimed at users of Web-based banking and brokerage sites, experts have long postulated that financial services providers would eventually play a bigger role in helping end users defend themselves, such as via offering advanced security features and anti-malware tools directly to customers versus relying on end users alone to protect […]
In the wake of President Obama’s recent moves to push issues of cyber-security far more broadly and visibly across the U.S. federal sector, Microsoft, arguably the most influential technology company in the nation, and even around the globe, is upping its own profile in the aerospace and defense market, which is sure to see a […]
Lest one should think that Trojan downloaders are getting long in the tooth, in terms of the variety of techniques used to hide their intentions or deliver their code, security researchers report that attackers are still creating innovative new methods to keep their programs under wraps until they are called into action and to ensure […]