- Researcher finds latest Office zero-day was first used in 2009
- Ultrabooks have Intel Anti-Theft tech, yawn
hackers in pictures
Attack Word documents designed to lure victims into opening them were crafted to fetch a PNG image file that contained an exploit for vulnerable versions of Office
For the last three months or so, the U.S. government and some of its defense contractors have engaged in a war of shame on China to pressure it to cool its cyber-attacks on U.S. targets. The campaign appeared to be yielding results, but it seems that Chinese hackers were only catching their breath.
With more and more consumers having their passwords compromised on a daily basis, a pair of researchers are floating an idea that they contend will help foil digital credential crackers.
The cyber attack Friday on the Internet deal site LivingSocial that forced it to reset the passwords of some 50 million users has elements of what's becoming an all too familiar storyline.
Two-factor authentication is in the spotlight again after the Twitter accounts for three CBS brands -- 60 Minutes, 48 Hours and a Denver news affiliate -- were hijacked and later suspended this weekend.
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?
Sign up now »
File MPS analyzes network file shares to detect and quarantine malware brought into the network through the Web, email, or other manual means, such as online file sharing.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.