Keeping ahead of web-based threats requires a mechanism to continually search for new types of attacks while understanding existing ones. However, data fragmentation and threat complexity plagues efforts to keep track of all the data related to malware…
Tax Phishes Spawn on Both Sides of Atlantic
Tax season in both the US and the UK is upon us and it looks like cybercriminals are once more trolling for unwitting victims with thematic phishing emails aimed to those preparing to render unto Caesar.
(ISC)² Teams with University of Phoenix for Cybersecurity Scholarships
With an eye toward tackling the cybersecurity workforce skills shortage, the University of Phoenix and the (ISC)² Foundation are teaming up to offer nine full-tuition scholarships for individuals looking to devote themselves to information security.
Angry Birds Leaks a Host of Info to Marketers
Bad piggies may need to be toppled, but fans of the ubiquitous Angry Birds mobile app should be aware that the popular game collects and shares players’ personal information much more widely than most people realize.
Criminal Underground is a Sophisticated Metropolis, with Stores, Education, and Law & Order
“Shadowy hacker underworld.” “Dark Web.” “Underground cyber-forum.” These are the phrases that get bandied about referring to those dark corners of the internet where cybercriminals publish their malware, espionage campaigns are hatched and hacktivist …
Analysis of 3 Billion Attacks Demonstrates Security Gap Between Attack and Defense
For the first time, NTT has pooled the resources of its group companies and produced a threat report based on an analysis of 3 billion attacks. What it found is that while attackers move faster than defenders, and there are still many basic processes a…
NHS Care.data PR Fiasco Continues as Google Pulls Out of Secret Deal
First the NHS was forced to delay its care.data project (storage of all patient GP health data in a central data warehouse) for six months; then it was learned that PA Consulting had obtained 27 DVDs of hospital event statistics (HES) and uploaded them…
Snoopy: A Non-NSA Flying Stingray
Stingray is a US law enforcement spoof cell tower used to track the location of mobile phones. Snoopy is a project conducted by London-based Sensepost Research Labs that does similar and much more with any WIFI-enabled device. Now Snoopy has gone airbo…
Apple Mac Ebay Scam Gang Busted
EC3, the cyber branch of Europol, has dismantled a Polish gang involved in online auction fraud. The gang would offer electronic items such as Apple computers, but deliver anything from a brick to items of fruit and vegetables. The scam involved Ebay a…
Turkish Twitter Ban: An Exercise in Futility?
Following a nationwide ban on Twitter last week, thousands of internet denizens have been working successfully to get around the moratorium. Now, Turkey has taken steps to thwart circumvention efforts that will result in IP address filtering – but it c…