Current Threats News
-
Microsoft Acknowledges Internet Explorer Zero-Day Used In Website Attack
2:57 PM EST Mon. May. 06, 2013
Visitors to the Department of Labor's nuclear-related content were targeted with a Microsoft zero-day vulnerability. -
Chinese Attackers Infiltrate Defense Contractor, Steal Sensitive Military Technology
12:14 PM EST Fri. May. 03, 2013
The QinetiQ attackers were persistent, remaining on the systems at one point for 251 days, accessing more than 150 computers and stealing 20 GB of data before they were detected, according to reports. -
WordPress Bloggers Beware: You're Easy Pickings For Cybercriminals
10:30 AM EST Fri. May. 03, 2013
Dell-SecureWorks researchers explain the dangers of failing to apply the latest patches to the WordPress platform and third-party components. -
The Top 5 Causes Of Corporate Data Breaches (Video)
2:30 PM EST Thu. May. 02, 2013
Verizon's new security report explains how businesses can avoid and minimize the risk of major data breaches. -
5 Ways To Avoid A Stolen Password Pitfall
1:00 PM EST Thu. May. 02, 2013
Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk. -
5 Phishing Attack Trends You May Have Missed
4:00 PM EST Tue. Apr. 30, 2013
Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns. -
Microsoft, Trend Micro Identify Surge in PDF Attacks
2:05 PM EST Tue. Apr. 30, 2013
The increase in document attacks stem from the popular Black Hole automated attack toolkit, which is targeting flaws patched as long as five years ago. Some targeted campaigns are exploiting older flaws as well. -
New Amazon Blog Tackles Web Services Security Concerns
11:38 AM EST Tue. Apr. 30, 2013
Amazon Web Services' security has been under scrutiny after a new study finds the complexity of managing Amazon S3 opens up security weaknesses that potentially expose confidential data. -
DDoS Attacks Behind Unauthorized Wire Transfers, ACH Fraud: Report
5:47 PM EST Mon. Apr. 29, 2013
Security researchers at Dell SecureWorks have found that short-lived DDoS attacks against banks could be a precursor to an unauthorized wire transfer. -
Adobe PDF Zero-Day Flaw Enables Location Tracking
3:26 PM EST Mon. Apr. 29, 2013
A zero-day flaw that impacts all versions of Adobe Reader enables the sender of a .PDF file to track when and where the file is opened. -
Cisco Warns Of Ongoing Attacks Targeting Dangerous Flaw
3:26 PM EST Wed. Apr. 24, 2013
Attackers are targeting an outdated flaw on one of the most widely used hosting control panels, the Plesk Panel, used by cloud-based hosting providers. -
Verizon Analysis: Top 10 Causes Behind Data Breaches
12:00 PM EST Wed. Apr. 24, 2013
Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012. -
Hit Parade: Oracle Faces Yet Another New Java Bug
10:53 AM EST Wed. Apr. 24, 2013
The latest Java coding error impacts both client- and server-side Java implementations and can be used to bypass built-in security restrictions, says a Security Explorations researcher. -
Top 10 Malware Threats To Microsoft PCs
10:00 AM EST Tue. Apr. 23, 2013
Trojans, adware, viruses, worms and spyware are used by cybercriminals to steal account credentials and ultimately gain access to credit card data, intellectual property and other information. Here's a look at the top 10 threats. -
Verizon Data Breach Report Finds Employees At Core Of Most Attacks
8:00 PM EST Mon. Apr. 22, 2013
Attackers are choosing the least sophisticated methods, often turning to phishing attacks and stolen account credentials, to gain a foothold into corporate networks, according to the 2013 Verizon Data Breach Investigations Report. -
McAfee Channel Chief Unveils Program Changes, Adds Partner Support (Video)
4:36 PM EST Thu. Apr. 18, 2013
In a wide-ranging interview, McAfee Channel Chief Gavin Struthers said the channel program has been retooled to include an improved partner portal, more outreach and support of sales initiatives. -
5 Reasons DDoS Attacks Are Gaining Strength
2:00 PM EST Wed. Apr. 17, 2013
The average attack bandwidth and duration has increased significantly in the first quarter of 2013, according to Prolexic Technologies, a maker of distributed denial of service (DDoS) protection appliances. -
Oracle Issues Critical Java Update, Plugging 42 Vulnerabilities
10:30 AM EST Wed. Apr. 17, 2013
Targeted attacks were up 42 percent in 2012, according to an analysis conducted by Symantec, and some of the attacks use known vulnerabilities -- including Java. -
Channel Beat: PC Shipments Down, Mobile Security Risks Up (Video)
2:30 PM EST Fri. Apr. 12, 2013
This week's episode of Channel Beat also looks at big acquisition news for CompuCom. -
Report: Apple, Android Apps Riddled With Coding Flaws
5:33 PM EST Thu. Apr. 11, 2013
Application security vendor Veracode advocates a zero-trust model for enterprises, making the case that every mobile application should be treated as malicious until enterprise IT teams have tested and validated them. -
Not Playing Nice: Chinese Hacker Gang Has Their 'Game' Face On
12:45 PM EST Thu. Apr. 11, 2013
Financially motivated cybercriminal gang is targeting online gaming companies, according to new research from Kaspersky Lab. -
Staples Still Silent On Severity Of Corporate System Breach
10:23 AM EST Wed. Apr. 10, 2013
Symantec is reported to be the security firm investigating the infection of Staples' corporate system, identifying it as a variant of the ChangeUp worm. -
Virtual Instruments Leads The Performance Management Charge (Video)
3:37 PM EST Tue. Apr. 09, 2013
John W. Thompson talks about this new company, Virtual Instruments, and how it's ensuring the optimal performance of applications housed in virtual and cloud-based environments. -
DOS Attacks Grab Headlines, But Stealthy Threats Are The Real Story
12:04 PM EST Mon. Apr. 08, 2013
'The one that makes the press is the biggest one ever, which is about as meaningful as the world's hottest cup of coffee,' says SANS Institute security expert John Pescatore. -
Staples Corporate Systems Hit With Malware Attack
6:35 PM EST Fri. Apr. 05, 2013
Office supply chain Staples is currently attempting to contain the spread of the notorious Changeup Worm on its corporate systems. The data stealing malware spreads through removable and mapped drives.
CRN Vault
CRN's 30th AnniversaryIn our special report, we reflect on the changes in technology and take a trip down memory lane as we reminisce on the companies and personalities that shaped the industry over the past three decades.
CHANNEL SERVICES >>
| • |
| • |
| • |
| • |
| • |
| • |
| • |
|
|


