Top IT Security Bloggers

  • Vulnerabilities in Alipay Android App Fixed

    TrendLabs - Malware Blog
    Alipay is a popular third-party payment platform in China that is operated by Alibaba, one of the biggest Internet companies in China. We recently found two vulnerabilities in their Android app that could be exploited by an attacker to carry out phishing attacks to steal Alipay credentials.  Alipay acknowledged it and provided updates to their users […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerabilities in Alipay Android App Fixed
  • Vulnerabilities in Alipay Android App Fixed

    Trend Micro - Security Intelligence
    Alipay is a popular third-party payment platform in China that is operated by Alibaba, one of the biggest Internet companies in China. We recently found two vulnerabilities in their Android app that could be exploited by an attacker to carry out phishing attacks to steal Alipay credentials.  Alipay acknowledged it and provided updates to their users […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerabilities in Alipay Android App Fixed
  • 22 Jump Street, Transformers Are Top Movie Lures for Summer

    TrendLabs - Malware Blog
    Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump Street was the top movie used for social engineering. Transformers: Age of […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro22 Jump Street, Transformers Are Top Movie Lures for Summer
  • 22 Jump Street, Transformers Are Top Movie Lures for Summer

    Trend Micro - Security Intelligence
    Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump Street was the top movie used for social engineering. Transformers: Age of […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro22 Jump Street, Transformers Are Top Movie Lures for Summer
  • 7 indispensable project management tips

    Infoworld Security Blog
    In my role as a traveling computer security consultant, I meet with project managers every week.read more
  • Hacker turns ATM into 'Doom' arcade game

    Sophos - Naked Security
    Its screen now eschews balances and transfers in favor of the familiar sight of a hand wrapped around a gun, going around dark corners and blasting stuff. Where did scrap metal hacker "Aussie50" pick this thing up? Do we have to worry about threats to our bank balances? And is he going to rig it with a coin mechanism so we can all play?
  • One hoax press release, one $300 million hole in mining company

    Sophos - Naked Security
    The fake press release was pretty convincing: it was sent from a domain that riffed on the ANZ Bank name, used the bank's logo, and included the name of a PR person, along with his (NOT!) phone number. It's yet another example of how easy it is to scam people online.
  • 1,000,000 lost credit cards = £150,000 fine

    Sophos - Naked Security
    A UK travel company has been fined £150,000 for putting an "internal only" parking database system on the internet without securing it first.

    The vulnerable system was used as a stepping stone for a crook to steal more than 1M e-commerce records.
  • Fancy $110,000? Easy! Just be Russian and find a way of cracking Tor

    Graham Cluley
    It looks like Russia is looking for a way to crack down on those who try to hide their activities from law enforcement agencies and government censors.

    Read more in my article on the Hot for Security blog.
  • Cybercrime Exposed Part 1: The Security Risks of Phishing

    Trend Micro - Security Intelligence
    While new threats are emerging that hit new avenues or targets like PoS systems and cryptocurrencies, old threats like phishing remains to be an effective means of gathering user data. A simple spam email that leverages holidays, online shopping, release of anticipated gadgets, and hot/current news items can redirect unsuspecting users to survey scams and phishing pages that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCybercrime Exposed Part 1: The Security Risks of Phishing
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Email Security and Data Protection

Encrypt your sensitive email

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.