OpenSSL vulnerability in TLS and SSL may have catastrophic consequences if not corrected immediately.
OpenSSL vulnerability in TLS and SSL may have catastrophic consequences if not corrected immediately.

Published: April 9th, 2014


Block hackers by learning the 7-step ‘kill chain’ method

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Published on: April 2nd, 2014 Candice So

Malware from spying on governments now used in cybercrime, Sophos says

Advanced persistent threats (APTs), once the province of hackers hired to spy on foreign governments and to gather intelligence, are no longer a rarity in the world of cybercrime – cybercriminals are now

Published on: March 12th, 2014 Candice So

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Published on: February 27th, 2014 Candice So

10 security concerns for the public cloud: Russinovich

SAN FRANCISCO - It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a

Published on: February 27th, 2014 Candice So

One shared database in security’s future: Trilling

SAN FRANCISCO – With all the weekly headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to believe that hackers will soon be the victors of the cybersecurity

Published on: February 27th, 2014 Candice So

Pony malware targeting passwords and Bitcoins uncovered

Correction: The original version of this story said there were attacks on 73,000 different websites. The correct number is 93,000. We regret the error. Security researchers have uncovered a new type of malware

Published on: February 26th, 2014 Candice So

A look ahead at next week’s RSA conference

With the RSA conference kicking off Feb. 24 in San Francisco, there’s a lot of buzz around what may – or may not – be revealed during one of the cyber security industry’s

Published on: February 21st, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Published on: February 19th, 2014 Candice So

Pressure’s mounting for IT departments: Trustwave

IT professionals are feeling more under pressure than ever, thanks to a wave of security threats, high expectations from executives, and new technologies entering the workplace, according to a new survey from security

Published on: February 14th, 2014 Candice So

Hacktivists ‘want to kill your business': Kaspersky

PUNTA CANA, DOMINICAN REPUBLIC – There are a lot of threats on the cyber landscape, but one of the threats that concerns Eugene Kaspersky the most is hacktivism. Kaspersky, the founder of Russian IT

Published on: February 12th, 2014 Jeff Jedras

Going to Sochi? How to avoid an Olympic hack attack

With thousands of athletes, officials and spectators descending on Sochi, Russia for the Winter Olympic Games, that’s a lot of laptops, tablets and mobile devices. And a tempting target for cyber criminals, and

Published on: February 11th, 2014 Jeff Jedras

Hackers can now log your keystrokes from your touchscreens

Hackers now have yet another way to trace your keystrokes – but it’s not the physical keyboard with its sturdy, plastic keys that they’re now after. A researcher at Trustwave Holdings Inc. has

Published on: January 20th, 2014 Candice So

Can a computer ever be secure enough for Grandma?

Has this ever happened to you? No matter where you are in your career, you still get unscheduled support calls from your mom, asking for help with her latest computer gremlin. I'm sure

Published on: December 16th, 2013 Claudiu Popa

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Published on: November 25th, 2013 Candice So