Help Net Security
1K employed consumers surveyed in the UK, only 4% named makers of mobile phone apps as entity they most trust with their personal data.
Survey revealed 1K websites over a 90-day period recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins.
Ongoing malicious spam impersonating UPS has shown malware peddlers experimenting with different approaches for infecting hapless users.
639 unique brands were targeted by phishing attacks, topping 614 seen in 4Q 2012.
81% employees access work documents on the go, in absence of enterprise-grade file sharing alternative.
Another Silk Road has been resurrected from the ashes of the old one, an infamous underground market.
3Q 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites.
Online threat, real-world d0x … makes a nice change from website defacing.
The State of Security
If personal data is compromised, greater than 1 in 4 chance you will be victim of identity theft resulting in fraud within the year.
Organizations having increasing difficulty detecting, mitigating advanced attacks aimed at network servers, relying on ineffective technologies.
Devious evolution of now-familiar ransomware schemes in which malware encrypts files on a number of network resources and demands a ransom for decryption key.
We Live Security
Mysterious, indestructible strain of malware can infect PCs, Macs and Linux machines, jump between machines with cables, Ethernet, WiFi and Bluetooth pulled out.
Adobe’s security breach bare 38 million pass
Details on one of the most important pieces of malicious code in the history of malware.