Threat Management News
Microsoft Reverses Course On Bug Bounties With Reward Program
7:18 PM EST Wed. Jun. 19, 2013
A new bug bounty program announced today by Microsoft will pay up to 100,000 for 'truly novel' exploitation techniques against the protections built into the latest version of Windows.
Tech 10: Hot Antivirus Alternatives For 2013
4:00 PM EST Wed. Jun. 19, 2013
CRN identifies 10 vendors that have developed innovative ways to detect malware and analyze threats to better protect corporate networks. They take a giant step beyond traditional signature technologies.
Samsung Galaxy S4 Contains Serious Smishing Vulnerability, Firm Warns
11:08 AM EST Wed. Jun. 19, 2013
Qihoo 360, a China-based mobile security firm, said it discovered a serious flaw in Galaxy S4 devices that could be used by SMS Trojans to rack up premium text messaging charges.
Oracle Fixes Critical Java Flaws, Repairs Tool
9:40 AM EST Wed. Jun. 19, 2013
A security update to Java SE repairs 40 vulnerabilities, including more than 30 that can be exploited remotely to gain access to a victim's sensitive data.
Popular WordPress E-Commerce Plugins Riddled With Security Flaws
4:33 PM EST Tue. Jun. 18, 2013
Israeli application security firm Checkmarx found SQL injection, cross-site scripting and other vulnerabilities in some of the most popular WordPress plugins.
Channel Security Vet Thurber Lands At WatchGuard
5:55 PM EST Mon. Jun. 17, 2013
Alex Thurber, who served stints at Cisco, McAfee and Tripwire, is taking on the top sales role at WatchGuard Technologies, reporting to CEO Joe Wang.
Sophos Puts Finishing Touches On MSP Program
5:15 PM EST Mon. Jun. 17, 2013
Sophos's new managed security services program includes pay-as-you-go monthly billing and usage-based pricing for MSP license holders.
Apple Discloses Law Enforcement Requests For Cloud Data
4:57 PM EST Mon. Jun. 17, 2013
Apple says it has received as many as 5,000 requests from U.S. law enforcement for customer cloud data since Dec. 1.
Active Attacks Targeting Microsoft Office Flaw May Stem From 2009
12:38 PM EST Mon. Jun. 17, 2013
Older version of Microsoft Office was used in a spate of targeted attacks that could have started as early as 2009, according to researchers studying the vulnerability.
10 Emerging Security Technologies Gaining Interest, Adoption
12:00 PM EST Mon. Jun. 17, 2013
Despite some security defenses being only in their infancy, they are attracting interest for addressing BYOD issues, cloud security concerns and stolen account credentials. Here's a look at some of the top new security areas gaining industry interest.
Growing Security Firm Takes On Batman, Sneakers Personas
1:15 PM EST Fri. Jun. 14, 2013
Stach and Liu, now called Bishop Fox, is one of a number of penetration testing and application services firms seeing its enterprise security business grow significantly in recent years.
Cisco Announces pxGrid For Identity, Device Context Awareness
6:09 PM EST Thu. Jun. 13, 2013
Cisco said its framework extends its security technology partnerships for addressing mobile device control and identity management through the network.
Eight Charged In 'Modern-Day Bank Robberies' Across U.S.
11:55 AM EST Thu. Jun. 13, 2013
Accounts at more than a dozen banks and credit card processors were infiltrated in an attack campaign that dates back to 2011 and attempted to steal at least $15 million from U.S. customers.
Zeus Malware Configured To Recruit Money Mules In Credit Card Theft
11:14 AM EST Thu. Jun. 13, 2013
Attackers abroad infect victims with malware and then attempt to recruit them by injecting advertisements for quick cash into employment web pages.
5 Government Intelligence Facilities You've Never Heard Of
4:00 PM EST Tue. Jun. 11, 2013
One facility has been around since the dawn of space exploration, while other buildings are still in construction. But, they all have serious data analysis and surveillance support activities associated with them.
Microsoft Fixes 19 Critical Internet Explorer Vulnerabilities
2:29 PM EST Tue. Jun. 11, 2013
The June 2013 round of Patch Tuesday security updates includes one critical bulletin for Internet Explorer and four bulletins in Office, Windows that are rated important.
Former Joint Chiefs Chairman Calls NSA Leak A 'Huge Breach'
1:28 PM EST Tue. Jun. 11, 2013
Retired U.S. Navy Admiral Mike Mullen told attendees at the Gartner Security and Risk Management Summit that the NSA leak could lead to tighter restrictions on Internet security.
Symantec Readying Integrated Product Road Maps, Sticking To Plan, Says CEO
12:50 PM EST Tue. Jun. 11, 2013
An integrated product portfolio will include Symantec's Altiris IT management Unit, ties into its data protection and encryption software and builds on the company's cloud strategy.
Malware Hijacks Two-Step Verification, Drains Bank Accounts
10:50 AM EST Tue. Jun. 11, 2013
The Bugat Trojan attempts to steal up to $200,000 a day for a cybercriminal gang. The latest iteration copies the Zeus and SpyEye malware families by capturing text messages on smartphones.
Cybercriminals Are Picking On U.S. Cloud Hosting Providers
10:35 AM EST Tue. Jun. 11, 2013
Financially motivated attacks that bilk account credentials and targeted threats designed to steal intellectual property are served up by using infrastructure at U.S. cloud hosting providers.
Mobile Device Management Market Won't Last: Gartner
7:55 PM EST Mon. Jun. 10, 2013
Despite being projected to be a $1.6-million market by 2014, Gartner analysts say the MDM landscape will either adapt or be consumed by firms that offer emerging technologies to apply mobile application controls.
Don't Rush To Buy Latest Security Appliance, Says Gartner
2:54 PM EST Mon. Jun. 10, 2013
Making an investment in people rather than technology might be better, according to Gartner, which started its summit for security executives this week. Security professionals need to help business leaders weigh the risks associated with important security decisions, according to Paul Proctor, a Gartner research vice president.
Attacks Target Plesk Flaw Impacting Some Apache Servers
2:47 PM EST Fri. Jun. 07, 2013
Security firms detecting ongoing attacks said the coding error in an outdated version of the control panel could give cybercriminals access to sensitive data or set up drive-by attacks targeting website visitors.
Data Breach Costs: 10 Ways You're Making It Worse
12:10 PM EST Fri. Jun. 07, 2013
A little planning and avoiding these 10 costly missteps can help mitigate the impact of a data security breach, according to the Ponemon Institute's latest research.
Microsoft Temporarily KOs Dangerous Citadel Botnet
9:25 AM EST Thu. Jun. 06, 2013
Citadel is responsible for spreading the notorious Zeus family of banking malware, which has stolen millions from the accounts of its victims in the past several years.
CHANNEL SERVICES >>