Top IT Security Bloggers

TrendLabs - Malware Blog
  • Website Add-on Targets Japanese Users, Leads To Exploit Kit

    TrendLabs - Malware Blog
    In the past few weeks, an exploit kit known as FlashPack has been hitting users in Japan. In order to affect users, this particular exploit kit does not rely on spammed messages or compromised websites: instead, it uses a compromised website add-on. This particular add-on is used by site owners who want to add social media […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWebsite Add-on Targets Japanese Users, Leads To Exploit Kit
  • Vulnerability in In-App Payment SDKs May Lead to Phishing

    TrendLabs - Malware Blog
    Vulnerabilities in apps are always a cause for concern, especially when said apps handle sensitive information, particularly financial. We examined two popular in-app payment (IAP) SDKs—Google Wallet and the Chinese payment platform Alipay—and discovered that these contain a vulnerability that can be exploited for phishing attacks. The versions we analyzed were Google IAP versions 2 […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroVulnerability in In-App Payment SDKs May Lead to Phishing
  • The Administrator of Things (AoT) – A Side Effect of Smartification

    TrendLabs - Malware Blog
    In an earlier article, we talked about the ongoing smartification of the home – the natural tendency of households to accumulate more intelligent devices over time. While this has its benefits, the residents of smart homes also need to invest their time and energy to maintain these devices. These requirements will only grow as more […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Administrator of Things (AoT) – A Side Effect of Smartification
  • Cybercrime Exposed Part 2: When Adware Goes Bad – A Closer Look at Adware

    TrendLabs - Malware Blog
    With the ostensibly harmless nature of adware, we are constantly tricked into believing that they are nothing but online nuisances. But underneath, they are marketing-engineered software that could potentially carry malicious programs to target your browsing behavior and spy on your other online activities. What is adware and why does it exist? Upfront, adware are […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCybercrime Exposed Part 2: When Adware Goes Bad – A Closer Look at Adware
  • Risks from Within: Learning from the Amtrak Data Breach

    TrendLabs - Malware Blog
    A recent report published by Amtrak’s Office of the Inspector General revealed that an employee of the passenger rail company had been selling passenger data for two decades. The buyer of this data was none other than the Drug Enforcement Agency, which paid the employee $854,460 over the period. Iowa’s senior senator, Check Grassley, sent a letter […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRisks from Within: Learning from the Amtrak Data Breach
  • 7 Places to Check for Signs of a Targeted Attack in Your Network

    TrendLabs - Malware Blog
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, thus making their detection a big challenge. As we’ve stressed in our previous entry about common misconceptions about targeted attacks, there is no one-size-fits-all solution against it; enterprises need to arm themselves with protection that can provide sensors where needed, as well as IT […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro7 Places to Check for Signs of a Targeted Attack in Your Network
  • Wearing Your Tech on Your Sleeve

    TrendLabs - Malware Blog
    Sartorial decisions and technology are often considered two separate, distinct items. However, the surge of wearable “smart” devices has blurred the line between the two. Nowadays, it is common to see people accessorized in pieces of equipment that complement their day-to-day activities. Some might assume that wearable smart devices are complicated futuristic gadgets. However, they […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWearing Your Tech on Your Sleeve
  • Suspicious Login Message Faked, Distributes Backdoor

    TrendLabs - Malware Blog
    Legitimate services are often used by cybercriminals to try and make their attacks more convincing. Recently, I spotted attacks that used services and platforms like Google Drive and Dropbox in order to look less suspicious to unwary users. I received a spammed message like the one shown right below that supposedly came from Gmail itself. It warned me that someone logged […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSuspicious Login Message Faked, Distributes Backdoor
  • DEF CON 22 Turns up the Heat on Devices

    TrendLabs - Malware Blog
    One resounding – but unsurprising – message from this year’s DEF CON conference in Las Vegas, Nevada was the increase in hacks against IoT devices. The lineup of hacked IoT devices was extensive. Many sessions focused on individual device hacks of consumer devices such as media players, IP cameras, cars, and home automation systems. Other sessions focused on industry-specific […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDEF CON 22 Turns up the Heat on Devices
  • August 2014 Patch Tuesday Includes Two Critical Updates

    TrendLabs - Malware Blog
    Microsoft has rolled out nine security bulletins for their August Patch Tuesday. Two bulletins are rated as Critical, while the rest are rated as Important. Microsoft Windows, Internet Explorer, Microsoft SQL Server, and Microsoft .NET Framework are some of the affected applications that these bulletins covered. One of the most notable bulletins in this month’s cycle is MS14-051, which addresses […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAugust 2014 Patch Tuesday Includes Two Critical Updates
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.