Trusteer identifies “factory outlet sales” of stolen login credentials in the underground economy

I love factory outlet sales. Just last week I bought a brand name mattress for pennies on the dollar. Of course, I had to travel to a dingy part of town and wander through a cavernous old warehouse with mattresses stacked to the ceiling to find my great bargain. Last night I enjoyed a great night of sleep on my plush new pillow-top mattress, and...

Read more

Second half of 2011 reflects shifting trends in cyber crime business, M86 reports

The percentage of email messages containing malicious links or attachments is high, even as the volume of spam has dropped sharply in the last year, according to a report by web security company M86. The report provides some good insight into the techniques and, if you will, the shifting business trends in the cyber criminal community. Those...

Read more

Implement user security awareness training — or don't

“Users. Can’t live with them, can’t live without them.” I heard that line more than once in my stint as the non-IT guy in the IT department at a newspaper company (I liked to think of myself as the poet laureate of the IT department). None of us, neither hardcore techniks nor geekish dilettante, were thinking much about...

Read more

Does polymorphic Android malware signal escalating mobile security war?

We don’t want to overplay the rise of mobile device malware — Security Bistro bloggers have been posting on mobile security issues quite a bit. That being said, new Symantec research that reveals the use of server-side polymorphism in malicious Android applications is yet another indication cyber criminals are getting more serious...

Read more

Sharing BYOD (bring your own device) experience from the trenches

I recently wrote about the business social networking site Wisegate, which brings together high -evel security and IT professionals to discuss and collaborate on their top-of-mind issues. Wisegate just released a report that summarizes what members are doing about creating and implementing mobile device management (MDM) policies for personally...

Read more

More Posts