Current Threats

  • Chomsky Warns Big Data Tech Will Be Used For Bad Purposes
    American linguist, philosopher and activist Noam Chomsky and Pulitzer prize winning author Barton Gellman, one of three reporters pouring over leaked NSA documents provided by Edward Snowden, said technology advances have complicated privacy and security, speaking at an MIT program exploring the benefits and the risks of big data projects.
  • Attacks Linked To China APT Supplier Target Channel Providers: Study
    A study of nearly a dozen targeted attack campaigns found different goals but similar traits link them to a malware supplier based in China, according to a new report issued by FireEye. The firm said some systems integrators and resellers are targeted in attacks using custom malware.
  • New Microsoft Zero-Day Attack Targeting U.S. Businesses
    A new Internet Explorer zero-day exploit is being hosted on a breached website based in the U.S., according to security firm FireEye, which said it is working closely with Microsoft to investigate the extent of the attack.
  • Cryptolocker: 5 Ways To Defend Against Ransomware Threats
    Cryptolocker, a virulent form of data ransom malware, puts businesses and individuals at risk of permanently losing files by encrypting them and demanding payment to regain access. Prevention is much easier and cheaper than recovering, say malware experts. Learn how to protect your critical data.
  • New Payment Security Rules To Hit Channel Heading Into 2014
    Set to take effect on Jan. 1, version 3.0 of the Payment Card Industry Data Security Standards bolsters the need for penetration testing of segmented payment environments and calls on service providers to employ stronger authentication measures when working with clients.
  • HyTrust Acquires HighCloud For Cloud Encryption
    The move builds out HyTrust's platform to provide access control and data protection in public, hybrid and private cloud environments. Channel providers say they are increasingly discussing cloud deployment data security measures with clients.
  • Limo Service Hack: 5 Celebrity Data Breach Victims
    A data breach at an online software provider for limousine transportation reservation solutions exposed credit card numbers and other personal information of thousands of celebrities. The latest data breach underscores the significance of protecting customer data, say security experts.
  • Microsoft Opens Bug Bounty Program To Incident Responders
    The latest iteration of Microsoft's new bug bounty program is being expanded to incident response teams and forensics investigators who find attacks in the wild. Individuals and teams can earn up to $100,000 for novel new techniques that bypass Microsoft's security restrictions.
  • 5 Obamacare Website Failures That Could Have Been Avoided
    An update to a longstanding study of software security activities at dozens of leading organizations found similarities in their approach that can be applied to any business seeking security improvements, including those helping to fix the glitch-riddled Obamacare site.
  • MongoHQ Shores Up Its Defenses After Data Breach
    The database hosting provider, which was founded in 2011, very likely lacked a strong security program with password management policies and other controls to protect access over critical applications, experts say.
  • Leaked NSA Documents Uncover Tap Into Yahoo, Google Networks
    The latest leaked documents from NSA whistleblower Edward Snowden shows a secret effort by the NSA and its British counterpart Government Communications Headquarters to intercept data flowing between the data centers maintained by Yahoo and Google globally.