500,000 bots blotted out with shut down of Web hosting firm

The shutdown last week of a U.S.-based Web hosting company crippled more than 500,000 bots, or compromised computers, which are no longer able to receive commands from criminals, a security researcher said today.Although

Published on: November 19th, 2008 Brian Jackson

Smartphones: the next target of malware attacks

Four years ago, F-Secure Chief Research Officer Mikko Hypponen was talking about malware infections on mobile phones while few others were paying attention. With the growing use of Internet-enabled phones, particularly Apple's iPhone

Published on: November 13th, 2008 Bill Brenner

Cybercrooks deliver holiday spam a month early

With a deteriorating economy and employees increasingly concerned about their own job security, cyber crooks are starting to take advantage of corporate insecurity by delivering their own brand of "cheer" to e-mail Inboxes

Published on: November 13th, 2008 Michelle MacLeod

Worldwide e-mail scam campaign exploits Obama victory

A worldwide malicious e-mail campaign is using sensational "news" about U.S. President-elect Barack Obama as bait to steal the financial information of recipients.There are two different e-mails being distributed, according to Dan Hubbard,

Published on: November 7th, 2008 Michelle MacLeod

5 million reasons why crooks peddle bogus software online

Criminals can make as much as $5 million a year by planting nearly worthless security software on PCs, then badgering users with so many bogus malware warnings that they fork over their credit

Published on: November 4th, 2008 Gregg Keizer

Terrible Trojan steals 500,000 bank account, credit card logons

A sophisticated cybercrime group that has maintained an especially devious Trojan horse for nearly three years has stolen the log-ons to more than 300,000 online bank accounts and almost as many credit cards

Published on: November 3rd, 2008 Gregg Keizer

E-mail attachment malware soars 800 per cent in 3 months

The volume of malware attacks conducted via e-mail attachments increased about 800 per cent over the past three months as this low-grade hacking method was brought back from the grave, according to a

Published on: October 28th, 2008 Brian Jackson

Ouch! – Why SQL injections really sting and how to protect yourself

"SQL injection" – the phrase seems forbidding, and the reality it signifies is quite sinister.In fact this concept was mostly unknown just a few months ago, but now Web site developers around the

Published on: October 24th, 2008 Brian Jackson

E-ticket scam crash lands victims into a load of malware

In a reprise of a summer tactic, hackers are trying to trick people into infecting their PCs with malware by e-mailing them spurious airline-ticket invoices and boarding passes, a security company said today.The

Published on: October 22nd, 2008 Gregg Keizer

Bots could imperil your iPhone and blight your Blackberry

The ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the past several years.Looking to 2009, don't expect

Published on: October 21st, 2008 Jaikumar Vijayan

Hackers compromise thousands of Web sites

Several criminal gangs have acquired administrative log-in credentials for more than 200,000 Web sites -- including the one used by the U.S. Postal Service -- and have used the compromised domains to attack

Published on: October 6th, 2008 Gregg Keizer

Cybercrooks cast Brad Pitt, Beyonce and Justin T. in latest malware attacks

Googling celebrities on your workstation at the height of the recently concluded Toronto Film Festival could have been one of the most risky cyber-activity this month.Reverting to a tried and true tactic, spammers

Published on: September 22nd, 2008 Nestor Arellano

US gov’t focuses on cybersecurity backdoor defences

As part of a comprehensive cybersecurity push, the U.S. government will focus on improving its network defense capabilities and on revamping acquisition rules to protect against malicious code installed during the manufacturing process

Published on: September 16th, 2008 Grant Gross

Stretching security – the mobile device challenge faced by the enterprise

Trying to secure laptops, cell phones, PDAs, and other mobile devices today is "terrifying," says Christopher Paidhrin, IT security and HIPAA compliance officer at Southwest Washington Medical Center. "End-point security is scarily immature."

Published on: September 11th, 2008 Tom Kaneshige