New York City – Microsoft has proven that it can take down huge, global botnets like Kelihos, Rustock and Waldec. Now the company is ready to start making the data it acquires in those busts available to governments, law enforcement and customers as a real time threat intelligence feed.
Browsing Category: SMB Security
As companies begin submitting their regulatory filings and financial reports from 2011, the SEC is pushing for more comprehensive data breach, cyber attack, and general risk-assessment disclosures.
Adobe said on Friday that it will issue critical fixes for its popular Reader and Acrobat products on Tuesday, January 10.
Microsoft said in a post on the Technet Web site that it plans to release seven security bulletins on Tuesday, fixing eight security holes in a variety of products. Among them will be a fix for a new class of software vulnerability – the “Security Feature Bypass,” which could be used by attackers to make other exploits more potent, Microsoft said.
A recent report by the UK’s Serious Organized Crime Agency (SOCA) shows that the Agency is full speed ahead with plans to use powerful data analytics tools to help find and prosecute everything from money laundering to illegal gambling to 419 scams.
Just days after a successful attack on the security think tank Stratfor, Anonymous, the anarchic hacking collective, is getting headlines again for an attack on Specialforces.com, a Web site used by members of the armed forces law enforcement officers and gun enthusiasts. However, an employee working for the online store said the group is playing the media by taking credit for a hack that happened months ago.
USAA is warning its members about a sophisticated phishing scam that attempts to install a malicious banking Trojan on members computers.
The Federal Trade Commission (FTC) is taking aim at a plan by the Internet Corporation for Assigned Names and Numbers (ICANN) to increase the number of domains on the Web.
The Romanian Banks Association has issued a warning to credit card users in that country to be on the lookout for suspicious charges, after the Agency received notice of a possible breach at European credit card processor.(PDF)
The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk.