Hundreds of HP computers came with an accidental keylogger
Commercial and consumer products affected.
Commercial and consumer products affected.
Users tend to receive the most emails with malicious attachments on Thursdays and they’re most likely to click on messages in the morning purporting to be from the local postal service, according to an analysis of email attacks that has reinforced the importance of time and human factors for cybersecurity protection.
David Braue | 08 Jun | Read more
George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data
Joan Goodchild | 15 Jul | Read more
The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption.
Thor Olavsrud | 23 Apr | Read more
In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.