Georgia man sentenced to nine years for stolen credit card data
A 28-year-old man was sentenced to more than nine years in prison Wednesday for buying stolen credit and debit card numbers from an underground online marketplace. Cameron Harrison of Augusta, Georgia, pleaded guilty in April to participating in a racketeer-influenced corrupt organization and trafficking in false identification documents. He was also ordered to pay $50.8 […] more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…Observations on the Evolution of Cyber Tactics in 2013
“There is one thing stronger than all the armies in the world, and that is an idea whose time has come.” – Victor Hugo The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that […] more…Facebook Spam Leverages, Abuses Instagram App
The downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged […] more…Beware, the Curious Case of iPhone Spyware
The new iPhone spy app launched officially by the Apple Store ought to be turning quite a few heads at this point. The name of the app is enough to stop everyone in their tracks. ‘Stalker’ is now available for download and only costing a meager 99 cents, there is no reason that anyone should not be one. […] more…More information
- Microsoft .NET Framework CVE-2018-0786 Security Bypass Vulnerability
- Microsoft PowerPoint CVE-2017-8742 Remote Code Execution Vulnerability
- How data breaches break down by state and sector
- Indians Are Increasingly Realising Nothing Said Online Is Private
- Resolved: Univesity Park labs – Printing in TLT CLM labs unavailable.
- Hybrid clouds pose new security challenges
- Black Hat USA 2017: what’s on the agenda in Las Vegas
- North Korean Group Kimsuky Targets Government Agencies With New Malware
- Run Windows 8 or 8.1 directly from a USB drive on any computer — for free
- New Attack Targets the Touchscreen of Smartphones, Researchers Reveal