• September 15, 2014
    The backdoor malware MIRAS got an upgrade from just running in 32-bit Windows operating system versions to 64-bit ones, expanding its victim range to more users of the OS. MIRAS is the same malware family linked to attacks against a Europe-based IT company.
  • September 14, 2014
    Threats analyst Bryant Tan shares some rules that IT administrators can proactively implement to set up “basic defense” for their network. These rules are not meant to cover all types of suspicious activity but are important in building a secure network.
  • September 14, 2014
    A few rules that IT administrators can proactively implement to set up “basic defenses” for their network that are likely to be missed.
  • September 11, 2014
    A list of five million Gmail accounts, paired with what appear to be passwords, was leaked in a popular Russian cryptocurrency forum.
  • September 10, 2014
    Roughly a week after a massive batch of stolen and debit cards went on sale in the underground market pointing to a breach in large retail giant Home Depot, the company confirms that their payment systems have been compromised.
  • September 04, 2014
    When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
  • August 27, 2014
    United Postal Service (UPS) recently disclosed a widespread malware breach on 51 of its 4,470 franchise stores. This potentially compromised about 105,000 customer transactions between the period of March 26 and August 11, 2014 in most stores.
  • August 14, 2014
    Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
  • August 06, 2014
    A Russian cybercrime ring known to have been running underground operations since 2004 allegedly stole 1.2 billion Internet usernames and passwords from 420,000 websites, including Fortune 500 companies.