- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Web proxy app becomes Bitcoin mining trojan
- Week in review: Great Bitcoin Robbery highlights shopping-season security risks
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
Getting infected USB sticks inside large firms and government organisations would be child's play for determined cybercriminals, Kaspersky Lab has found after one of its researchers successfully persuaded staff at several to open a PDF file during a staged visit.
Analyst firm A-V Comparative has released its November 2013 list of the antimalware programs that do the best job of removing malware from an already infected system.
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
A new financial malware program that communicates with attackers over the I2P (Invisible Internet Project) anonymity network is for sale on a Russian cybercrime forum.
The PHP Group will reset the passwords for accounts on php.net, the official website of the PHP programming language, and will change the site's SSL certificate after attackers compromised two servers and injected malicious code into the website.
The Internet is already a general service in the Philippines, benefiting nearly 30 million Filipinos for everything from looking for a place, reading news, shopping and connecting with others through social networks.
Sign up now »
Think your endpoints are secure? Think again. Learn why Trend Micro can help.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.