Shifting Attacks Put Increasing ID Fraud Burden on Consumers
Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price. Continue reading Shifting Attacks Put Increasing ID Fraud Burden on Consumers
Collaborate Disseminate
Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price. Continue reading Shifting Attacks Put Increasing ID Fraud Burden on Consumers
Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools. Continue reading Persistent Attackers Rarely Use Bespoke Malware
Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter. Continue reading Lessons From the War on Malicious Mobile Apps
Even by conservative measures, 2018 was a record year for security breaches. Here’s why the numbers are likely going to continue to increase Continue reading Breach Outlook for 2019: Winter is Coming
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software. Continue reading Microsoft, Adobe Both Close More Than 70 Security Issues
A spate of attacks using the SamSam ransomware toolkit cost victims millions. The success of that campaign is also breeding copycats Continue reading SamSam Teaches Hard Lessons about the Cost of Security Unpreparedness
The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva. Continue reading Web Vulnerabilities Up, IoT Flaws Down
Online criminals and vandals are targeting containers and virtual machines, in some cases compromising insecure infrastructure and causing other mischief Continue reading Attackers Get (Virtually) Mean
SIM card fraud is on the upswing as more cyber criminals look to target victims’ mobile phones to take over their accounts. Continue reading SIM Swapping Poses New Problems for Phone Security
As cryptomining malware leads to a surge in cryptojacking, organizations look to blunt the impact of the unwanted code on users’ systems Continue reading Tallying Up the Hidden Costs of Cryptomining Malware