|
Organized crime focuses on the big score
Cybercriminals look to steal even more sensitive data and score big in 2008, according to an analysis of 90 data breaches handled by Verizon Business. 2009-04-16 Read more ... | Comment(s) | Post Comment Microsoft patches a passel of flaws The software giant releases eight patches to fix more than a score of vulnerabilities, including critical issues in Internet Explorer, Office, DirectX and the Windows HTTP server. 2009-04-14 Read more ... | Comment(s) | Post Comment Twitter targeted by XSS worms Snippets of Javascript code exploit a cross-site scripting (XSS) vulnerability to spread throughout the microblogging network over the weekend. 2009-04-13 Read more ... | Comment(s) | Post Comment Power grid's vulnerability no surprise Reports of state-sponsored hackers reconnoitering electric companies garner a collective yawn from the security community. 2009-04-11 Read more ... | Comment(s) | Post Comment Cable sabotage knocks out Bay Area networks Vandals cut ten cables in four South San Francisco Bay locations, knocking out phone and Internet service to tens of thousands of customers as well as ATM and wireless networks. 2009-04-10 Read more ... | Comment(s) | Post Comment Conficker gang updates worm via peer-to-peer While the mainstream media hyped the April 1 changeover for the Conficker worm, its creators waited nearly a week to introduce an update. 2009-04-09 Read more ... | Comment(s) | Post Comment Rogue security apps worry Microsoft most The software giant releases a survey of its security data, finding that rogue software tops its list of threats and that more attackers are targeting third-party applications. 2009-04-08 Read more ... | Comment(s) | Post Comment Tenuous trail leads from GhostNet to hacker An e-mail address in the GhostNet report leads two researchers to a seemingly low-level Chinese hacker, but an author of the original report stresses the criminal is likely unrelated to the massive surveillance network. 2009-04-03 Read more ... | Comment(s) | Post Comment Senators ready bills to beef up cybersecurity Deciding not to wait for the Obama administration to complete a 60-day review, two senators have drafted bills to create a top advisory post in the White House and license cybersecurity professionals. 2009-04-01 Read more ... | Comment(s) | Post Comment Spam back up to pre-McColo levels Four months after ISPs disconnected hosting provider McColo, the volume of junk e-mail has returned to its previous levels, according to Google. 2009-03-31 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |