Stolen Gaming Credentials Uncovered
Do you play games online? If you do, you may want to change your log in credentials. Symantec has unearthed a server hosting the credentials of 44 million stolen gaming accounts. As described in a blog...
View ArticleRisky Trojan Horse for OS X Found
A new Trojan horse malware that affects Mac OS X has been found called “trojan.osx.boonana.a.” It is being disguised as a video link and distributed through social-networking sites like Facebook. It...
View ArticleSpam Traffic Hits Record High
In the third quarter of this year, spam of all types represented an average of 82.3 percent of all email traffic and malicious spam surged to a record high of 4.6 percent of all email, up from 1.9...
View ArticleThe Latest Electronic Scams
It’s Cyber Monday! Happy shopping! So maybe you don’t fall for those emails from Nigerian royalty asking you to wire money, but digital criminals are getting sneakier each year. “These guys are...
View ArticleThe Gawker Hack and Lessons Learned
The December 2010 Gawker Media hack was successful due in part to poor password construction. The passwords were reportedly hash-encrypted. The main purpose of password hashing encryption is to obscure...
View ArticleScareware Defeats Apple Security Update
Last week (May 31) Apple released a security update to rid Macs of the menacing malware that has been around for nearly a month and is attempting to get users to purchase a bogus anti-virus software...
View ArticleNew Tricks Used by Computer Crooks
A new malware variant tries to trick people into voluntarily transferring money from their accounts to a cyber thief’s account. The German police have warned consumers about a new Windows malware...
View ArticleBoston Cyber Week, Nov 14 – 18
The STOP. THINK. CONNECT. campaign is launching its Cyber Week program to engage communities to promote awareness and dialogue about the dangers Americans face online. The Cyber Week Program, will be...
View Article2012 Will See Rise in Cyber-Espionage and Malware
Security experts expect to see a continuing trend in the rise of malware-based attacks that result in sensitive data being stolen from government agencies, defense contractors, Fortune 500 companies,...
View ArticleThe Six Most Dangerous IT Attacks
The most popular track session of RSA San Francisco for the past five years was again packed to the rafters this year. Hundreds of delegates poured in to see the vivacious Ed Skoudis and Joannes...
View ArticleSecurity SIG’s First Lunch Meeting, July 16th
Security SIG is holding its first luncheon on Wednesday, July 16th, 12:00 – 1:00 pm. If you haven’t yet signed up for Security SIG, please do so. Main topic: “The Biggest Threats to Security Today.” If...
View ArticleWebinar: The Internet of Things
MS-ISAC is a multi-state information sharing group that supports the government with its cyber security mission. It offers a free national webinar each month. This month’s webinar, called “The Internet...
View ArticleSecurity Predictions of 2015
What will be this year’s biggest security threats? Each time January rolls around, security professionals look at past threats and try to determine what will happen in the upcoming year. It’s a good...
View ArticleNational Webcast: Emerging Trends and Threats for 2015
Steven Hurst of AT&T’s Global Customer Security Services will be presenting this month’s national webcast hosted by MS-ISAC. Tune in on February 11th (free registration) to hear him speak about:...
View Article
More Pages to Explore .....