Infection rates and end of support for Windows XP

In the newly released Volume 15 of the Microsoft Security Intelligence Report (SIRv15), one of the key findings to surface relates to new insight on the Windows XP operating system as it inches toward end of support on April 8, 2014.In this post we want to highlight our ...

How Seniors Put Themselves at Risk for ID Theft Online

NEW YORK (MainStreet) — Conventional wisdom has it that age begets wisdom — but being technologically savvy about protecting your identity and money while online is a whole different thing.According to the U.S. Federal Trade Commission, consumers age 65 and up are particularly vulnerable to online ID theft."Many ...

If you travel a lot, Distress Signal is an app well worth having on your phone

Sometimes the simplest ideas make the most useful apps. Distress Signal is aimed at people in need of the emergency services but without the ability to speak to them on the phone. Maybe you’re in a country where you don’t speak the local language, or maybe you’re in ...

Using NFC as a secure smart card reader

IBM scientists have developed a new mobile authentication security technology based on the radio standard known as near-field communication (NFC). The technology provides an extra layer of security when using an NFC-enabled device and a contact-less smart card to conduct mobile transactions.

Researchers debunk Apple's iMessage encryption in wake of NSA leaks

In a presentation in Kuala Lumpur, Malaysia, Quarckslab, a research company that specializes in addressing security problems, takes on Apple's assertion that it's iMessage technology can be trusted not to give up its secrets.

Hacked small-businesses often have no place to turn

Participant hold their laptops in front of an illuminated wall at the annual Chaos Computer Club (CCC) computer hackers\\' congress, called 29C3, on December 28, 2012 in Hamburg, Germany. It was March 2010, the height of the financial crisis, and the housing market was in the dumps. Michelle ...

ATM malware coughs up cash on demand

Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.I currently purchase or influence the purchase of computer security related services and/or applications:*A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.If you do not receive your confirmation email within the ...

Obama's Likely Pick for NSA Chief Is a Master Spy. It May Not Be Enough.

Vice Admiral Michael S. Rogers, the odds-on favorite to be nominated by President Obama as the next director of the National Security Agency, has all of the intelligence and military credentials for the position. "A walking resume for this job," said retired Admiral James Stavridis, who recently served ...

Getting out of shared endorsements in Google ads

Google has made Google+ very difficult to avoid. Now, it is leveraging Google+ to get you more involved in selling its ads. Opting out is pretty simple. But, you need to work at it.

Facebook and Google want you to shill for their advertisers

The great thing about social networks is that everyone on them is susceptible to becoming Soylent Green for advertisers. Facebook really doesn't give a damn about your privacy. Google just announced that it will take your Google+ reviews and chuck them up in ads. You won't care because fake friends are so much easier than real friends.

Report: Several top websites use device fingerprinting to secretly track user

A new study by KU Leuven-iMinds researchers has uncovered that 145 of the Internet’s 10,000 top websites track users without their knowledge or consent. The websites use hidden scripts to extract a device fingerprint from users’ browsers. Device fingerprinting circumvents legal restrictions imposed on the use of cookies and ignores the Do Not Track HTTP header. The findings suggest that secret tracking is more widespread than previously thought.

Black Hole Exploit - A Business Savvy Cyber Gang Driving a Massive Wave of Fraud

Tucked away in a small town outside Moscow, Russia one of the world’s most prolific and effective cybercriminals works away on the next version of malicious software that will enable the theft of millions of dollars from unsuspecting victims around the world.Going by the online moniker of “Paunch,” ...

AVG, Avira and WhatsApp pwned by hacktivists' DNS hijack

The websites of freebie antivirus vendors AVG and Avira as well as mobile messaging service WhatsApp appear to have been hit by a DNS redirection attack today which sent users to pro-Palestinian websites.Visitors to avg.com were greeted by a rendition of the Palestinian national anthem (via an embedded ...

Ensuring the Right Security Budget for 2014

“It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity…” Charles Dickens, A Tale of Two Cities Given the state of budget ...

Study: Cybercrime Costs Grow 26%

A big challenge when attempting to drum up support for investments in information security is demonstrating the cost of data breaches and other cybercrimes. But because very few cyber-attack victims have revealed the costs involved, sizing up the potential financial impact is tough. And that can make it ...

Europol Confirms Arrest of Blackhole Exploit Kit Creator 'Paunch'

Following 24 hours of uncertainty, Europol has confirmed that the renowned Russian cyber-criminal known as Paunch has been arrested.An artist\\'s illustration shows a supermassive black hole, a phenomenon which gives its name to one of the most prevalent cyber-threats on the web. (Reuters)In a move likely to have ...

Adobe security breach: now what?

Well, the first thing you can do is change your Adobe ID and password. And there's more.

Iranian cyber war commander found dead in the woods

One more mysterious death to add to that of five nuclear scientists and the head of the Islamic Republic's ballistic missile program. However, the Revolutionary Guard, 12 hours after the first reports, is saying it wasn't an assassination.

Adobe announces horrendous security breach

Over 2.9 million customers have their credit card and data compromised. That's a nice way of saying, stolen.  It looks like the breach has far reaching consequences because the attack went through Adobe's Coldfusion and there may be inherent weaknesses in the code. Coldfusion is widely used by many sites as a web application development platform and server.   

Video: Hackers bypass Apple's Touch ID

A hacker group based in Germany says it has managed to crack Apple's new Touch ID biometric security system with a modified fingerprint lifting method and a "fake finger" creation technique.