On September 27, Adobe posted a blog stating that the company is investigating the inappropriate use of an Adobe code signing certificate for the Windows operating system. Symantec is aware of this issue and has added protection to detect any unauthorized file signed by the Adobe ce
Recently, I talked at the VB2012 conference in Dallas about one of the recent developments in today’s threat landscape: the increasing prevalence of police ransomware. Earlier, Trend Micro published a white paper discussing this threat, titled The “Police Trojan”. The idea behind ransomware is relatively simple: the cybercriminals block the user from accessing their own [...]
Telvent tells customers that it's discovered that attackers breached its internal firewall and security systems, implanted malicious software, and stolen project files linked to its smart grid product. Experts detected digital fingerprints implicating a Chinese hacking group.
Posts masked as the fake web app “TumViewer” and “Online Income Solutions” were seen circulating on the popular blogging site Tumblr. Both offer something to Tumblr users, but in reality, they are social engineering lures meant to hook users into another run-of-the-mill survey scams. TumViewer and Online Income Solutio: Just Another Survey Scams Several Tumblr [...]
The US Federal Trade Commission has reached a settlement with a remote monitoring software firm and its customers over what the agency said was flagrant computer spying on customers of the rental stores.
Two friends from Akamai take issue with the idea that there's something new about the nature of DDoS attacks targeting U.S. Bank, Wells Fargo and others.
Christopher Soghoian gave the keynote presentation at the VB2012 conference in Dallas, exploring the growing industry in selling details of exploitable vulnerabilities to the highest bidder.
The Cloud Security Alliance says its guidance report on Identity Access Management is the first of 10 components that make up the Defined Categories of Security as a Service (SecaaS) in the cloud environment.