Latest Headlines

Latest Headlines

Infographic: 2013 sets data breach record

As the IT security world continues to process the magnitude of the Target data breach, Symantec is confirming what many of us suspected--that 2013 was a record-setting year for data breaches.

Cybercriminals have upper hand in IT security race

In this Editor's Corner, I'd like to take a deep dive into a cybercrime report prepared by the nonprofit think tank RAND, best known for its national security research.

Spotlight: Win-Spy increasingly being used by cybercriminals

Win-Spy, a commercial stealth monitoring tool, is increasingly being used by cybercriminals and other malicious types, according to a report by Infosecurity Magazine.

Spotlight: Tor provides safe haven for cybercriminals

The Tor network, set up to provide anonymity for users, is increasingly being used by cybercriminals to host malicious infrastructure, warns Kaspersky Lab.

CryptoLocker copycat spreads through removable drives

A new variant of CryptoLocker, the ransomware that encrypts data and then requires payment to unscramble it, is spreading through removable drives for the first time, warns security firm Trend Micro.

News Scan: Google looks in rear-view mirror; Crafty cybercriminals favor social media now; more

Quick takes on mobile IT news for Wednesday, 12/18 including: Google's very own year-end review and general back patting, ReadWriteWeb's interview with Flurry CEO Simon Khalaf declaring mobile to be the ultimate, predictions for cybercriminal activity on social networks in 2014 and the new collaboration between Sprint and Dish concerning LTE offerings.

Cybercriminals increasingly using compromised digital certificates to camouflage malware

Cybercriminals are increasingly using compromised digital certificates to camouflage malware, warns McAfee Labs' third quarter security report.

Most senior execs clueless about handling data breaches, survey finds

Senior business leaders are not prepared for a data breach, with fewer than one in four knowing enough to take the lead should a breach occur, according to a survey of 341 senior executives and in-depth interviews with 17 senior executives conducted by the Economist Intelligence Unit on behalf of HP.

Spotlight: Cybercriminals steal Social Security money from retirees

Cybercriminals are using the Social Security Administration portal to steal retiree benefits by using a retiree's stolen personal information to register an SSA account, according to Brian Krebs on his blog.