There is a growing global criminal-infrastructure-as-a-service economy being perpetrated through exploit kits and compromised website redirection chains – with billions of attacks adding to cybercriminals’ sophistication and ability to evade detection….
Botnets Take to Mobile Dating App Tinder to Flirt and Hurt
A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
Microsoft and secunet Team Up on Secure Tablet
secunet and Microsoft Germany are showing how a reliable, highly secure and ultra-mobile solution can become reality through a combination of security technology made in Germany and a high-performance tablet.
Kaspersky Unveils Interactive Cyberthreat Map
The trend toward visualizing virtual threat data continues with an interactive cyberthreat map from Kaspersky Lab, which displays cybersecurity incidents occurring worldwide in real time.
Insider Leaks 1,000-page Dossier on BBC Confidential Sources
The UK’s Information Commissioner’s Office has been asked to investigate alleged breaches of data protection laws after a former employee of Films on Record leaked a 1,000-page dossier of confidential information and source material from the BBC to the…
The Evolution of Mobile Security
Today, I posted a blog entry to the Oracle Identity Management blog titled Analyzing How MDM and MAM Stack Up Against Your Mobile Security Requirements. In the post, I walk through a quick history of mobile security starting with MDM, evolving into MAM…
‘Online Learning’ Scam Delivers Bogus Card Charges
A prolific international scheme designed to fleece unwary consumers with bogus sub-$15 charges is making the rounds, according to security researcher Brian Krebs. The common thread? The victims have all paid for online learning tools, but instead have …
Tesla Electric Vehicle Owners Should Beware the Phish
Connected cars are continuing to wheel their way into consumer lives, with some, like Elon Musk’s Tesla line of electric vehicles, serving as prototypes for the Internet of Things (IoT)-enabled future. Sleek, sustainable and connected, the Tesla Model …
Sally Beauty Data Breach Larger than Originally Thought
The Sally Beauty data breach is likely larger than the 25,000 records the cosmetic supply company originally thought had been compromised. It has issued a statement noting that the unauthorized intrusion into its network it detected on March 5 may have…
Facebook Builds its Own Threat Information Framework
Keeping ahead of web-based threats requires a mechanism to continually search for new types of attacks while understanding existing ones. However, data fragmentation and threat complexity plagues efforts to keep track of all the data related to malware…