As the international community coordinates its response to the deepening crisis in Syria, scammers have once again demonstrated their skill at using current, high-profile events to their advantage. We have previously covered these methods in regards to Egypt, Libya, and the Rugby World Cup.… Read More
Shortcut files are fast becoming a common vehicle used in targeted attacks to deliver malware into organizations. Symantec has observed a variety of ways that shortcut files are being used to penetrate networks because they allow for evasion in threat detection by security products.… Read More
HID Global, a global provider of secure identity solutions, continues its drive to help financial institutions secure online banking services that nearly half of all their customers prefer for convenient account access. … Read More
IT executives must stop being so technology-focused and start talking with government leaders and politicians about data lost risks and cyber security.
Noting that most IT people, particularly CIOs and CTOs do not understand the language of business, Erick Stephens, CTO-Asia Pacific, Microsoft Public Sector, lamented that “because we are so techie, we talk about big data, and we lose the opportunity to talk with the politicians.”
Talking with politicians and government leaders, he pointed out, “will become very relevant with cyber security because all digital assets (information) will be at stake.”
“Who owns the risk?” he asked, “the Chief Executive Officer or the business owner?” Not the Chief Information Officer or the Chief Technology Officer, he emphasized.… Read More
Trend Micro Incorporated has exposed a new targeted attack campaign called “Safe” which compromised government ministries, technology firms, media outlets, academic institutions and non-governmental organizations from over 100 countries.
This campaign was first seen on October 2012.… Read More