[img_assist|nid=2201|title=|desc=|link=none|align=left|width=100|height=100]New data compiled by Verizon in an addendum to its Data Breach Investigations Report shows that the vast majority of reported and investigated data breaches are the result of external incidents, not insider threats.
Browsing Tag: malware
[img_assist|nid=2168|title=|desc=|link=none|align=left|width=100|height=100]Citing a rising tide of complaints from people
who unknowingly bought counterfeit software infected with malware,
Microsoft announced the launch of educational initiatives
and enforcement actions in over 70 countries to raise awareness of
counterfeit software and to protect consumers. Read the full article. [Dark Reading]
[img_assist|nid=2171|title=|desc=|link=none|align=right|width=100|height=100]As 2009 draws to a close, one thing has become clear: The most dangerous piece of software on your PC isn’t a banking Trojan or a bot; it’s your Web browser.
In part two of this three-part series, Team Cymru members discuss more of the most successful and innovative malware attacks of 2009.
Team Cymru, an independent security research firm, discusses the most innovative malware attacks of 2009 in part one of a three-part video series.
[img_assist|nid=2138|title=|desc=|link=none|align=right|width=100|height=100]Scam e-mail artists have launched a massive campaign to trick
webmasters into giving up the credentials needed to administer their
Web sites, targeting site owners at more than 90 online hosting
providers. Read the full article. [Washington Post]
[img_assist|nid=2134|title=|desc=|link=none|align=right|width=100|height=100]Phishers actually land a tiny percentage of
victims, but the end result is big bucks — to the tune of $2.4 million
to $9.4 million a year, according to a new study that measured real
phishing attacks on banks. Read the full article. [Dark Reading]
[img_assist|nid=2122|title=|desc=|link=none|align=right|width=100|height=100]A Swiss iPhone developer has released a new application that is capable of harvesting huge amounts of personal data from iPhones, including geolocation data, passwords, address book entries and email account information, all using just the public API.
[img_assist|nid=2115|title=|desc=|link=none|align=right|width=100|height=100]Months after it first appeared on the scene, the Gumblar malware continues to infect thousands of servers across the Internet and is closing in on nearly 80,000 servers pointing to the hosts that are serving the malware.
[img_assist|nid=2079|title=|desc=|link=none|align=left|width=129|height=44]A Cyber Forensics panel at the U.S Spy Museum discussed data breaches and the effects one bad hacking event can have; The panel discussion included the CEO of Heartland Payment Systems, whose company was the victim of a very large, very publicized data breach in 2008. Read the full article. [Dark Reading]