IDG News Service - There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information...
Read moreIDG News Service - Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria...
Read moreIDG News Service - Eastern European-based attackers gained access to the networks of energy providers by tampering with software updates for industrial control systems, gaining a foothold that could be used for sabotage, Symantec said Monday...
Read moreIDG News Service - Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month...
Read moreComputerworld - Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics...
Read moreComputerworld - Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service companies via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks...
Read moreIDG News Service - A critical vulnerability found in a WordPress plug-in that has been downloaded over 1.7 million times allows potential attackers to take complete control of blogs that use it...
Read moreSummary: This vulnerability affects: Adobe Flash Player 13.0.0.214 and earlier, running on all platforms (and Air)...
Read moreAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server...
Read more"Arbor Networks’ ASERT has recently discovered a new malware family that combines several techniques to steal payment card information. Dubbed Soraya, meaning “rich,” this malware uses memory scraping techniques similar to those found in Dexter to target point-of-sale terminals...
Read more