Verizon: "No Organization is Immune to a Data Breach in this Day and Age"

Opportunistic attacks, the majority of which were financially motivated, were far and away the biggest threat source of 2012, accounting for 75 percent of all breaches analyzed in the latest Verizon Data Breach Investigations Report (DBIR). State-affiliated cyberespionage campaigns held the number two breach spot, accounting for 20 percent of...

Read more

"Community Defense" For a Safer Internet

Early identification of attacks across a community of Web applications can significantly improve the effectiveness of application security, according to the latest Imperva Hacker Intelligence Initiative report. The report, "Get What You Give: The Value of Shared Threat Intelligence," analyzed real-world attack traffic against 60 web...

Read more

Solutionary: North Korea Cyberattack Activity Boomed in February

February saw a significant jump in cyber attack activity emanating from North Korea, according to recent analysis. IT security vendor Solutionary found that “touches”-- a known reconnaissance, an overt external attack or the attempted exfiltration of data -- from North Korean IP addresses spiked during the month of February....

Read more

Not Just for PCs Anymore, Malware is Showing up on Offshore Drilling Rigs

I live in Houston, Texas, the undisputed Energy Capital of the World. Houston has an entire area of town nicknamed the Energy Corridor where numerous oil and gas companies have their headquarters, or at the very least, a major presence. Within those gleaming towers, geologists, chemists, engineers and a host of other highly educated professionals...

Read more

There’s BadNews, and There’s Really Bad News

By now you’ve probably heard about BadNews, a malware family that is targeting Android phones. In a blog post of April 19, the security firm Lookout reported that it had discovered BadNews in 32 apps across 4 different developer accounts in Google Play. Lookout reported its findings to Google, and the apps (and developers) have subsequently...

Read more

More Posts