Notorious Rock Phish gang pummels PC users with new attack strategy

A notorious online gang known for its prolific phishing operations has expanded its means of attack, potentially putting more PC users at risk of losing personal data.The Rock Phish gang surfaced around 2004,

Published on: April 22nd, 2008 Jeremy Kirk and Robert MacMillan

Sweet-toothed employees willing to exchange passwords for candy

Is your network secure enough to fight off chocolate?The short answer: probably not. Even with all of the security-related news in recent years, Infosecurity Europe's now famous experiment (it just completed the sixth

Published on: April 21st, 2008 Mark Gibbs

CEOs, senior mangers’ computers hacked in fake subpoenas scam

Panos Anastassiadis didn't click on the fake subpoena that popped into his Inbox on Monday morning, but he runs a computer security company. Others were not so lucky. In fact, security researchers say

Published on: April 18th, 2008 Robert MacMillan

How to nab the enemy within

Corporations are woefully unprepared to counter attempts at corporate espionage, say experts who perform vulnerability assessments designed to uncover security weaknesses. North American corporations lose as much as $300 billion a year to

Published on: April 18th, 2008 Mary Brandel

Expert tips on saving your brand from being cyber-jacked

Authentication technologies are a great way for businesses to protect their corporate domains against use in phishing and spoofing attacks, experts say.Internet Service Providers (ISPs) and many businesses are ramping up use of

Published on: April 7th, 2008 Brian Jackson

New reputation tools foil treacherous Web 2.0 hack attacks

Reputation-measurement is one of the newer ways of blocking malware in a world where threats have grown more elaborate and cunning, and Web 2.0 has grown the audience for rich media.While the continuing

Published on: April 4th, 2008 Stephen Bell

Ten reasons you should be paranoid each time you power up your PC

The truth is out there ... and so is your data. And just because there are no virtual black helicopters following you doesn't mean somebody somewhere doesn't have a bead on who you

Published on: April 2nd, 2008 Dan Tynan

New online tax scams and how to avoid getting ripped off

Scam artists exploiting tax season have devised a range of new online cons: fake tax documents that contain malicious surprises; mass distribution of keyloggers aimed at snatching the identity of PC-based tax filers;

Published on: April 1st, 2008 Tom Spring

Online crooks target government Web sites for phishy tax refunds

Stealing money through fraudulent tax refunds was the main purpose of phishing activity targeting government Web sites during the month of February. This was a finding of "The State of Phishing" monthly report

Published on: March 28th, 2008 Joaquim P. Menezes

New security threats baffle IT professionals

As enterprises seek out ways to reduce IT costs, optimize resources and improve operational efficiencies, three technology trends have started to dominate: virtualization, service-oriented architecture and mobility. More promising yet is the intertwining

Published on: March 25th, 2008 Deb Radcliff

Apple updates Safari and OS X in double whammy update

Apple Tuesday issued a record-breaking security update that patched nearly 90 vulnerabilities in both its own code and the third-party applications it bundles with its Tiger and Leopard operating systems. Security Update 2008-002

Published on: March 20th, 2008 Gregg Keizer

Security vendor Trend Micro victim of massive Web attack

Security vendor Trend Micro has fallen victim to a widespread Web attack that splashed malicious software onto hundreds of legitimate Web sites in recent days.A Trend Micro spokesman confirmed that the company's site

Published on: March 17th, 2008 Robert McMillan

Brand jacking causing huge damage to corporate reputations

Phishers, cyber-squatters, and other online fraudsters continued their assault on well-known corporate brands over the last 12 months, increasing the burden on the companies being targeted and further frustrating consumers.According to MarkMonitor's annual

Published on: February 27th, 2008 Matt Hines

New phishing attacks use DNS tricks to dupe hapless users

The latest information on phishing indicates that fraudsters are increasingly using malicious software to direct users to their deceptive sites.The Anti-Phishing Working Group (APWG) said in a new report Thursday that it saw

Published on: February 1st, 2008 Jeremy Kirk