Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Icefog Cybercriminals Use Java Backdoor to Target US Organizations

Back in September 2013, researchers from Kaspersky published a report on Icefog, a cybercriminal campaign that mainly targeted organizations in Japan and South Korea. After further analyzing the...

View Article


Industry Acquisitions Show Enterprise Appetite for Malware Analysis,...

FireEye’s acquisition of Mandiant and last month’s acquisition of Norman Shark by Blue Coat Systems reflect the growing awareness among enterprises that they need sophisticated security technologies...

View Article


Google Chrome 32.0.1700.77 Security Fixes

Google pushed a new stable version of the Chrome browser (32.0.1700.77) for Windows, Mac, and Linux on Tuesday and improved its security with a total investment of $8,000 / €5,875 in external...

View Article

UK Government Reportedly Bans Videoconferencing Devices from Huawei

The British Home Office, Ministry of Justice, the Crown Prosecution Service and other government departments have allegedly stopped using videoconferencing equipment from Huawei due to concerns that...

View Article

China’s Huawei Denies US Spies Compromised its Equipment

BEIJING – Chinese tech giant Huawei, which has long been dogged by security suspicions abroad, on Wednesday denied a report its telecommunications network equipment had been compromised by US spies....

View Article


NSA Taps Offline Computers Using Radio Waves: Report

NSA Taps Offline Computers with Secret Bug: Report WASHINGTON – The US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when...

View Article

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks

Distributed denial-of-service (DDOS) attack protection solutions provider Prolexic has published its Global DDOS Attack Report for the fourth quarter of 2013. The company says that cybercriminals are...

View Article

Tech Q&A: How thieves steal data but don’t take it

QUESTION: My computer was “nailed” by the CryptoLocker malware. It has encrypted my Microsoft Word documents and Excel spreadsheets so that I can’t access them.

View Article


Healthcare.gov Could Suffer an Insider Breach, Experts Predict

SpectorSoft, a company that specializes in user activity monitoring and analysis software, has published its predictions for 2014. The predictions are interesting because theyre from the perspective of...

View Article


US-CERT Warns of NTP Amplification Attacks

US-CERT is warning organizations about a form of distributed denial-of-service attacks that seek to overwhelm victims with UDP traffic via publically-accessible NTP servers. NTP stands for Network Time...

View Article

Mobile-based DDoS Attacks Create Mitigation Challenges: Report

According to a new report from Prolexic Technologies, a provider of Distributed Denial of Service (DDoS) protection services that was recently acquired by Akamai Technologies, mobile applications are...

View Article

Amazon, Google and GoDaddy Cloud Services Increasingly Abused by Cybercriminals

Managed security services provider Solutionary has published its SERT Quarterly Threat Intelligence Report for Q4 2013. The report focuses on malware analysis, malware distribution and the...

View Article

Class Action Filed Against Neiman Marcus Following Data Breach

A class action has been filed against Neiman Marcus, the high-end retailer that suffered a data breach in which customer payment card information has been compromised. SC Magazine reports that the...

View Article


Quantum physics could make secure, single-use computer memories possible

Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology .

View Article

16 Saudi Arabian Government Websites Hacked by Syrian Electronic Army

Hackers of the Syrian Electronic Army have breached and defaced a total of 16 Saudi Arabian government websites. The targeted sites are the ones of various administrative regions, also known as...

View Article


AVG Confirms One of Its Webservers Was Hacked and Defaced

AVG has confirmed that one of its webservers was recently breached by hackers. The IT security company is investigating the incident. HackRead reported that the famous Indonesian hacker Hmei7 targeted...

View Article

Infosec Salaries Among Highest in IT

While two reports find that infosec pay is among the best in IT, infosec pros also face some of the greatest on-the-job challenges.

View Article


Internet Infrastructure Attacks Yield High Returns for Cybercriminals: Cisco

Cisco paints a grim picture for 2014 in its annual security report, predicting “unprecedented growth” for advanced malicious attacks. The barrage of non-stop attacks is also taking a toll on the...

View Article

Website of Turkey’s Central Bank Disrupted by RedHack

Shortly after leaking the phone numbers of over 4,000 Turkcell employees, hackers of the RedHack group have announced a new attack. Theyve disrupted the official website of the Central Bank of Turkey...

View Article

Juniper Networks Launches New Virtualized Security Solutions

Juniper Networks has unveiled a new virtualized security platform designed to protect private and public cloud deployments. Called the Firefly Suite, the solution allows customers to attach, create and...

View Article
Browsing all 2490 articles
Browse latest View live