Spear phishing so effective its scary [infographic]

If Moby Dick were written today, Ishmael might be a social engineering-hacker instead of a sailor and Moby Dick might be a corporate CEO instead of a sperm whale. That's because spear phishing

Published on: May 23rd, 2013 Brian Jackson

A third of all malware undetected by virtualized security networks

Roughly a third of malware sent to a virtualized environment for analysis is able to elude detection, a security expert says.Security vendors sell virtualized appliances to run and analyze thebehavior of suspicious applications

Published on: June 20th, 2012 Antone Gonsalves

Express IT: NDP attack response shows that no one understands computers

At last weekend's NDP leadership convention, the party wanted the media to focus on the future prospects of the federal political party, but instead media was trying to understand an IT problem.The party

Published on: March 28th, 2012 Brian Jackson

LulzSec members arrested after leader snitches on them: report

The suspected mastermind of the LulzSec hacker group has reportedly confessed to their alleged crimes and helped authorities arrest and build a case against his fellow cyber criminals.Unsealed court papers filed in New

Published on: March 6th, 2012 ITBusiness Staff

Hackers stole Michael Jackson songs worth $250 million from Sony

Sony's PlayStation Network major outage last year was not the only damage done by hackers. Michael Jackson's entire back catalogue of more than 50,000 music files, worth some $250 million, was stolen as

Published on: March 5th, 2012 ITBusiness Staff

Hackers selling off Web credentials amassed in huge databases

Cyber-criminals have amassed so many credentials for various social networks and Web services that they are now creating the equivalent of discount factory outlets to sell them off, Trusteer Research reports. The Web

Published on: February 8th, 2012 ITBusiness Staff

Hackers picking on Windows Media Player exploit

Security researchers from antivirus vendor Trend Micro have come across a Web-based attack that exploits a known vulnerability in Windows Media Player."Earlier today, we encountered a malware that exploits a recently (and publicly)

Published on: January 27th, 2012 Lucian Constantin

Video Rewind: Data security important when accepting plastic payment

With new services offering small merchants a way to accept credit card payments on an iPhone (such as the product offered by Payfirma) it's now easier than ever to ask your customers "will

Published on: January 26th, 2012 ITBusiness Staff

More hackers hijacking email, Facebook accounts

More hackers are hijacking email and Facebook accounts but almost a quarter of their victims are doing nothing to prevent falling prey again, a new global study says. The amount of spam sent

Published on: October 24th, 2011 Christine Wong

Users could stop nearly all infections by updating, Microsoft report says

Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes areavailable, Microsoft says.A zero-day is a vulnerability for which a patch is not yet

Published on: October 13th, 2011 Julie Bort

Operation Shady RAT: Canadian targets among those hacked

Every company in every conceivable industry is compromised by hackers - or will be­ shortly - according to a report from McAfee, a major maker of cybersecurity software."I am convinced that every company

Published on: August 3rd, 2011 John Ribeiro and John P. Mello Jr.

Super crimeware kit expected to hit underground economy soon

Security researchers are reminding businesses to bolster computer security measures as two of the most widely used do-it-yourself cybercrime kits are soon to be combined into one super kit.Attack toolkits or crimeware are

Published on: January 18th, 2011 Brian Jackson

Most security software products come up short, says test lab

A majority of security software suites still fail to detect attacks on PCs even after the style of attack has been known for some time, underscoring how cybercriminals still have the upper hand.

Published on: August 18th, 2010 Jeremy Kirk

Five easy ways to protect your online privacy

Is there such a thing as online privacy anymore?The recent evidence might suggest that there's not: AT&T's 3G network is hacked, revealing thousands of iPad owners' email addresses. The company later suffers another

Published on: August 10th, 2010 David A. Milman