Virtual currencies have to be regulated, says security expert

There's no shortage of people who have opinions on the virtual currency called Bitcoin. This week alone you could find a headline on Mashable that read, "Retailers Who Take Bitcoin Love It," while

Published on: August 7th, 2014 Howard Solomon

Trustwave promises customers zero malware with new offering

U.S.-based security solutions provider Trustwave Holdings Inc. is launching a new managed services offering – and it’s promising that businesses that sign up for it will never get infected with malware. Trustwave’s new

Published on: July 15th, 2014 Candice So

How Cryptolocker and ransomware take data hostage

From “software leases” to Cryptolocker, ransomware has been around for a while – but criminals are now taking victims’ data hostage as a way to make money, moving to mobile devices and other

Published on: June 19th, 2014 Candice So

2013 year of the ‘mega breach’: Symantec

Cyber-criminals are getting better at using targeted attack methods and strategic planning to break into the digital data vaults held by major corporations, according to Symantec Corp. Last year set a record both

Published on: April 8th, 2014 Brian Jackson

Block hackers by learning the 7-step ‘kill chain’ method

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Published on: April 2nd, 2014 Candice So

Malware from spying on governments now used in cybercrime, Sophos says

Advanced persistent threats (APTs), once the province of hackers hired to spy on foreign governments and to gather intelligence, are no longer a rarity in the world of cybercrime – cybercriminals are now

Published on: March 12th, 2014 Candice So

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Published on: January 2nd, 2014 Candice So

Twitter, Chrome OS, HTML 5 — top attack targets this year

Popular social networking sites such as Twitter and Facebook, Google's Web-based Chrome operating system, and the updated HTML 5 (hyper text markup language), are prime targets for cyber attacks in 2010, says a

Published on: January 7th, 2010 Nestor Arellano

Banking fraudsters target Internet phone systems at SMBs

Cybercriminals have found a new launching pad for their scams: the phone systems of small and medium-sized businesses across the U.S.In recent weeks, they have hacked into dozens of telephone systems across the

Published on: November 2nd, 2009 Robert MacMillan