Threat Management News
-
Microsoft Acknowledges Internet Explorer Zero-Day Used In Website Attack
2:57 PM EST Mon. May. 06, 2013
Visitors to the Department of Labor's nuclear-related content were targeted with a Microsoft zero-day vulnerability. -
McAfee Acquires Stonesoft For Enterprise Firewall Capabilities
10:18 AM EST Mon. May. 06, 2013
McAfee says its Stonesoft buy will add next-gen firewall capabilities and an advanced malware detection engine to its intrusion prevention and firewall product lines. -
Chinese Attackers Infiltrate Defense Contractor, Steal Sensitive Military Technology
12:14 PM EST Fri. May. 03, 2013
The QinetiQ attackers were persistent, remaining on the systems at one point for 251 days, accessing more than 150 computers and stealing 20 GB of data before they were detected, according to reports. -
WordPress Bloggers Beware: You're Easy Pickings For Cybercriminals
10:30 AM EST Fri. May. 03, 2013
Dell-SecureWorks researchers explain the dangers of failing to apply the latest patches to the WordPress platform and third-party components. -
The Top 5 Causes Of Corporate Data Breaches (Video)
2:30 PM EST Thu. May. 02, 2013
Verizon's new security report explains how businesses can avoid and minimize the risk of major data breaches. -
5 Ways To Avoid A Stolen Password Pitfall
1:00 PM EST Thu. May. 02, 2013
Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk. -
WhiteHat: Almost All Websites Have One Serious Coding Error
12:22 PM EST Thu. May. 02, 2013
WhiteHat's latest report analyzes data from websites at more than 650 organizations that are monitored by the firm's Sentinel application security platform. -
Breach Stats Prompt Need For Vulnerability, Configuration Assessment: Report
7:40 PM EST Wed. May. 01, 2013
Enterprises need to focus on vulnerability and configuration weaknesses that are consistently being targeted by attackers, according to security experts. -
Digital Privacy Watchdog Calls Out Apple, AT&T, Verizon
11:25 AM EST Wed. May. 01, 2013
A new report by the Electronic Frontier Foundation gives out some low grades to companies for a lack transparency and potentially freely give up user information to the government. -
5 Phishing Attack Trends You May Have Missed
4:00 PM EST Tue. Apr. 30, 2013
Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns. -
Microsoft, Trend Micro Identify Surge in PDF Attacks
2:05 PM EST Tue. Apr. 30, 2013
The increase in document attacks stem from the popular Black Hole automated attack toolkit, which is targeting flaws patched as long as five years ago. Some targeted campaigns are exploiting older flaws as well. -
New Amazon Blog Tackles Web Services Security Concerns
11:38 AM EST Tue. Apr. 30, 2013
Amazon Web Services' security has been under scrutiny after a new study finds the complexity of managing Amazon S3 opens up security weaknesses that potentially expose confidential data. -
Dutch Officials Nab Suspect In Spamhaus DDoS Attacks
10:09 AM EST Tue. Apr. 30, 2013
Authorities arrest a man in Spain and seize computers, data carriers and mobile phones they say were connected with the March attacks on the antispam blacklisting service Spamhaus. -
DDoS Attacks Behind Unauthorized Wire Transfers, ACH Fraud: Report
5:47 PM EST Mon. Apr. 29, 2013
Security researchers at Dell SecureWorks have found that short-lived DDoS attacks against banks could be a precursor to an unauthorized wire transfer. -
Adobe PDF Zero-Day Flaw Enables Location Tracking
3:26 PM EST Mon. Apr. 29, 2013
A zero-day flaw that impacts all versions of Adobe Reader enables the sender of a .PDF file to track when and where the file is opened. -
LivingSocial Data Breach Affects Millions
10:05 AM EST Mon. Apr. 29, 2013
LivingSocial, which localizes daily deals, events, restaurant listings and merchandise, revealed a data security breach late Friday, informing at least 50 million users that some customer data was accessed. -
Adobe Taps Senior Director For Newly Created CSO Role
7:43 PM EST Thu. Apr. 25, 2013
Brad Arkin, who has overseen the company's product security and incident response initiatives, was named to the newly created position of chief security officer. -
Box Brings In Former Symantec, Yahoo Execs To Ramp Up Security, Trust
5:58 PM EST Thu. Apr. 25, 2013
Box hires former security executives from Yahoo and Symantec in its bid to bolster trust with customers and encourage enterprise adoption. -
New Sophos Americas Chief Examining Partner Lead Gen Concerns
4:18 PM EST Thu. Apr. 25, 2013
Former Astaro business partners are seeing the well of sales leads dry up, indicating Sophos could be focusing on other parts of its business. -
CA Acquires Layer 7 To Bolster Cloud, Mobile Security Strategy
4:02 PM EST Wed. Apr. 24, 2013
Layer 7 Technologies will be integrated into CA's access management and Web application delivery portfolio. -
Cisco Warns Of Ongoing Attacks Targeting Dangerous Flaw
3:26 PM EST Wed. Apr. 24, 2013
Attackers are targeting an outdated flaw on one of the most widely used hosting control panels, the Plesk Panel, used by cloud-based hosting providers. -
Verizon Analysis: Top 10 Causes Behind Data Breaches
12:00 PM EST Wed. Apr. 24, 2013
Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012. -
Hit Parade: Oracle Faces Yet Another New Java Bug
10:53 AM EST Wed. Apr. 24, 2013
The latest Java coding error impacts both client- and server-side Java implementations and can be used to bypass built-in security restrictions, says a Security Explorations researcher. -
AP Twitter Account Takeover, Rogue Tweet Leads To Market Hit
4:00 PM EST Tue. Apr. 23, 2013
A Twitter account hijacking could be linked to weak or stolen passwords, experts say. -
Microsoft Security Tool Helps Slam The Door On Attacks, Says Researcher
10:55 AM EST Tue. Apr. 23, 2013
Microsoft's Enhanced Mitigation Experience Toolkit can make it much more difficult for attackers to gain an initial foothold into corporate systems, says a Verizon security researcher.
CRN Vault
CRN's 30th AnniversaryIn our special report, we reflect on the changes in technology and take a trip down memory lane as we reminisce on the companies and personalities that shaped the industry over the past three decades.
CHANNEL SERVICES >>
| • |
| • |
| • |
| • |
| • |
| • |
| • |
|
|


