Block hackers by learning the 7-step ‘kill chain’ method

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Share on LinkedIn Comment on this article Share with Google+ Published on: April 2nd, 2014 Candice So

Malware from spying on governments now used in cybercrime, Sophos says

Advanced persistent threats (APTs), once the province of hackers hired to spy on foreign governments and to gather intelligence, are no longer a rarity in the world of cybercrime – cybercriminals are now

Share on LinkedIn Comment on this article Share with Google+ Published on: March 12th, 2014 Candice So

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

10 security concerns for the public cloud: Russinovich

SAN FRANCISCO - It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

One shared database in security’s future: Trilling

SAN FRANCISCO – With all the weekly headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to believe that hackers will soon be the victors of the cybersecurity

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

Pony malware targeting passwords and Bitcoins uncovered

Correction: The original version of this story said there were attacks on 73,000 different websites. The correct number is 93,000. We regret the error. Security researchers have uncovered a new type of malware

Share on LinkedIn Comment on this article Share with Google+ Published on: February 26th, 2014 Candice So

A look ahead at next week’s RSA conference

With the RSA conference kicking off Feb. 24 in San Francisco, there’s a lot of buzz around what may – or may not – be revealed during one of the cyber security industry’s

Share on LinkedIn Comment on this article Share with Google+ Published on: February 21st, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Share on LinkedIn Comment on this article Share with Google+ Published on: February 19th, 2014 Candice So

Pressure’s mounting for IT departments: Trustwave

IT professionals are feeling more under pressure than ever, thanks to a wave of security threats, high expectations from executives, and new technologies entering the workplace, according to a new survey from security

Share on LinkedIn Comment on this article Share with Google+ Published on: February 14th, 2014 Candice So

Hacktivists ‘want to kill your business’: Kaspersky

PUNTA CANA, DOMINICAN REPUBLIC – There are a lot of threats on the cyber landscape, but one of the threats that concerns Eugene Kaspersky the most is hacktivism. Kaspersky, the founder of Russian IT

Share on LinkedIn Comment on this article Share with Google+ Published on: February 12th, 2014 Jeff Jedras

Going to Sochi? How to avoid an Olympic hack attack

With thousands of athletes, officials and spectators descending on Sochi, Russia for the Winter Olympic Games, that’s a lot of laptops, tablets and mobile devices. And a tempting target for cyber criminals, and

Share on LinkedIn Comment on this article Share with Google+ Published on: February 11th, 2014 Jeff Jedras

Hackers can now log your keystrokes from your touchscreens

Hackers now have yet another way to trace your keystrokes – but it’s not the physical keyboard with its sturdy, plastic keys that they’re now after. A researcher at Trustwave Holdings Inc. has

Share on LinkedIn Comment on this article Share with Google+ Published on: January 20th, 2014 Candice So

Can a computer ever be secure enough for Grandma?

Has this ever happened to you? No matter where you are in your career, you still get unscheduled support calls from your mom, asking for help with her latest computer gremlin. I'm sure

Share on LinkedIn Comment on this article Share with Google+ Published on: December 16th, 2013 Claudiu Popa

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So