Browsing Tag: malware

[img_assist|nid=3308|title=|desc=|link=none|align=right|width=87|height=136]While many outside of the security industry
still perceive “hackers” as teenagers or isolated geeks who work alone, a recent research report encourages the general
public to see malware as a cooperative industry that supports
specialists, economies, and supply chains. Read the full article. [Dark Reading]

Read more...

Categories: Government

[img_assist|nid=3283|title=|desc=|link=none|align=left|width=100|height=100]In the wake of the attacks against Google, Adobe and other major high-tech companies, there was a lot of public shock and outrage that this kind of attack happened. But it was really just a small part of what’s been going on for years. In a conversation with Dennis Fisher, Tom Kellermann of Core Security explains why the U.S. government and private companies are so unprepared for these attacks.

Read more...

Categories: Malware

[img_assist|nid=3279|title=|desc=|link=none|align=right|width=100|height=100]Last year was an interesting year in the security industry in a number of ways, but perhaps none more so than the monstrous increase in the volume of malicious spam. In the second half of 2009, the number of spam messages sent per day skyrocketed from 600 million to three billion, according to new research.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=3243|title=|desc=|link=none|align=left|width=100|height=100]Critical infrastructure organizations, such as those in the energy,
oil, pharmaceutical and chemical sectors, encountered at least twice as
much web malware as other organizations during 2009, researchers found. Read the full article. [Secure Computing]

Read more...

[img_assist|nid=3190|title=|desc=|link=none|align=right|width=100|height=100]Some of the bugs Microsoft patched today will be exploited by hackers almost immediately, security researchers predicted. Microsoft’s massive update — a record-tying 13 separate security bulletins that patched 26 vulnerabilities — gives attackers all kinds of ways to compromise machines and hijack PCs. Read the full article. [Computerworld]

Read more...