Current Threats News
Ransomware Attack Now Steals Passwords, Microsoft Warns
9:50 AM EST Mon. May. 20, 2013
A dangerous attack that locks up victims' computers and demands a ransom also goes after account credentials.
Dimension Data Cloud Chief: Cloud Platform Providers Must Fight Fraud, Cybercrime
1:51 PM EST Fri. May. 17, 2013
Some cloud providers fail to address account fraud and realize the extent of the cybercrime problem, said John Rowell, formerly chief technology officer at cloud provider OpSource, and now leads global research and development, and service operations in Dimension Data's Cloud Solutions Business Unit.
Malware Behind Oldest, Most Active Spam Botnet Gets Refresh
6:53 PM EST Wed. May. 15, 2013
The Pushdo botnet has been given a new domain name generation algorithm making it even more difficult for security researchers and law enforcement to knock out its command-and-control infrastructure.
Adobe Gets Busy With Fixes For ColdFusion, Reader, Flash
10:00 AM EST Wed. May. 15, 2013
Adobe's security updates repair dozens of flaws in Flash and its PDF software as well as a zero-day vulnerability in its ColdFusion software that has been actively targeted by cybercriminals.
Dimension Data CEO Lays Out $12 Billion Plan
7:24 PM EST Tue. May. 14, 2013
CEO Brett Dawson says the global systems integration giant is doubling down on providing its own Dimension Data-branded cloud-computing services offerings.
Patch Tuesday: Microsoft Fixes Critical IE8 Flaw Used In Targeted Attacks
6:08 PM EST Tue. May. 14, 2013
Microsoft has repaired an Internet Explorer 8 vulnerability used in a serious watering-hole attack targeting Department of Energy employees in one of 10 bulletins issued as part of its monthly release of security updates.
Cybercriminals Put More Muscle Behind Travnet Botnet
9:36 AM EST Tue. May. 14, 2013
An analysis of Travnet finds that the attackers are actively bolstering its infrastructure. The botnet is believed to be behind recent targeted cyberespionage attacks.
5 Companies That Dropped The Ball This Week
11:10 AM EST Fri. May. 10, 2013
For the week ending May 10, CRN looks at five companies that were either asleep at the wheel or just didn't make good decisions.
Microsoft Patch Tuesday To Include Critical Internet Explorer Fix
4:21 PM EST Thu. May. 09, 2013
The software giant said it plans to issue 10 security bulletins across its product line including two critical bulletins affecting Windows and Internet Explorer.
Microsoft Issues Temporary Fix For Internet Explorer 8 Zero-Day Flaw
10:40 AM EST Thu. May. 09, 2013
The Shim Workaround temporary patch iwill prevent attackers from successfully exploiting the remote code execution vulnerability in the browser, according to Microsoft.
Name Of The Game: Top 10 States For Identity Theft
12:00 PM EST Wed. May. 08, 2013
A Federal Trade Commission report provides statistics on identity theft and fraud complaints in 2012. Learn which state has the dubious distinction of having the most victims.
Solution Provider Review: F5's Application Delivery Firewall (Video)
11:15 AM EST Wed. May. 08, 2013
FishNet Security's Robert Schaffer explains why F5 Network's new add-on for its Advanced Firewall Manager delivers an extra layer of protection.
Microsoft: Don't Be Fooled By The Cool Exploit Kit
11:12 AM EST Wed. May. 08, 2013
A Microsoft security researcher warns that the Cool Exploit Kit is expected to 'propagate soon' and users should take caution when visiting unfamiliar websites.
Microsoft Acknowledges Internet Explorer Zero-Day Used In Website Attack
2:57 PM EST Mon. May. 06, 2013
Visitors to the Department of Labor's nuclear-related content were targeted with a Microsoft zero-day vulnerability.
Chinese Attackers Infiltrate Defense Contractor, Steal Sensitive Military Technology
12:14 PM EST Fri. May. 03, 2013
The QinetiQ attackers were persistent, remaining on the systems at one point for 251 days, accessing more than 150 computers and stealing 20 GB of data before they were detected, according to reports.
WordPress Bloggers Beware: You're Easy Pickings For Cybercriminals
10:30 AM EST Fri. May. 03, 2013
Dell-SecureWorks researchers explain the dangers of failing to apply the latest patches to the WordPress platform and third-party components.
The Top 5 Causes Of Corporate Data Breaches (Video)
2:30 PM EST Thu. May. 02, 2013
Verizon's new security report explains how businesses can avoid and minimize the risk of major data breaches.
5 Ways To Avoid A Stolen Password Pitfall
1:00 PM EST Thu. May. 02, 2013
Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.
5 Phishing Attack Trends You May Have Missed
4:00 PM EST Tue. Apr. 30, 2013
Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.
Microsoft, Trend Micro Identify Surge in PDF Attacks
2:05 PM EST Tue. Apr. 30, 2013
The increase in document attacks stem from the popular Black Hole automated attack toolkit, which is targeting flaws patched as long as five years ago. Some targeted campaigns are exploiting older flaws as well.
New Amazon Blog Tackles Web Services Security Concerns
11:38 AM EST Tue. Apr. 30, 2013
Amazon Web Services' security has been under scrutiny after a new study finds the complexity of managing Amazon S3 opens up security weaknesses that potentially expose confidential data.
DDoS Attacks Behind Unauthorized Wire Transfers, ACH Fraud: Report
5:47 PM EST Mon. Apr. 29, 2013
Security researchers at Dell SecureWorks have found that short-lived DDoS attacks against banks could be a precursor to an unauthorized wire transfer.
Adobe PDF Zero-Day Flaw Enables Location Tracking
3:26 PM EST Mon. Apr. 29, 2013
A zero-day flaw that impacts all versions of Adobe Reader enables the sender of a .PDF file to track when and where the file is opened.
Cisco Warns Of Ongoing Attacks Targeting Dangerous Flaw
3:26 PM EST Wed. Apr. 24, 2013
Attackers are targeting an outdated flaw on one of the most widely used hosting control panels, the Plesk Panel, used by cloud-based hosting providers.
Verizon Analysis: Top 10 Causes Behind Data Breaches
12:00 PM EST Wed. Apr. 24, 2013
Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012.
CHANNEL SERVICES >>