Latest Headlines

Latest Headlines

Spotlight: If you're stuck with Windows XP, how do you tread water?

Journalist Andy Patrizio lists the remaining options for software support after Microsoft's long and drawn-out exit.

Malware hijacks smartphones to mine cryptocurrencies similar to Bitcoin

A new form of malware has been introduced that uses a botnet of smartphones to mine for virtual currencies similar to Bitcoin.

Effective IT security program requires investment in people, processes

An effective IT security program requires investment not only in technology but also in people and processes, something that Target failed to do.

Spotlight: 6 steps for fighting SQL Injection attacks

The venerable SQL Injection attack method has a long-standing place atop the leaderboard of SANS' most common vulnerabilities.

Spotlight: New Android bug could 'brick' devices

A new Android bug could cause Android smartphones and tablets to get stuck in an "endless reboot loop," effectively turning the device into a brick, warn Trend Micro researchers

New worm infects thousands of IoT devices, mines cryptocurrency, warns Symantec

A new type of malware, first discovered in November, is infecting Internet of Things devices in order to mine cryptocurrency, according to computer security company Symantec.

Mt. Gox hackers hide malware in data dump

Hackers who infiltrated and commandeered systems belonging to Mark Karpeles, CEO of bitcoin exchange Mt. Gox, hid bitcoin-stealing malware in documents about missing bitcoins many Gox users felt compelled to download, according to researchers at Kapersky Lab.

GRC, security risks pose obstacles to enterprise adoption of social networking

Governance, risk management and compliance issues, as well as security concerns, will be key challenges to adoption of enterprise social networking, warns market research firm Frost & Sullivan.

'Dark web' behind massive retailer breaches, says McAfee

The "dark web" malware industry is behind the growing attacks on point-of-sale systems operated by leading retailers, including the high profile attack against Target, says McAfee Labs.

Spotlight: Tor provides safe haven for cybercriminals

The Tor network, set up to provide anonymity for users, is increasingly being used by cybercriminals to host malicious infrastructure, warns Kaspersky Lab.