- Security Blog
- By Eduard Kovacs
- November 28th, 2012
![Cooperation Between CERTs and Law Enforcement Is Crucial, ENISA Says Cooperation Between CERTs and Law Enforcement Is Crucial, ENISA Says](https://news-cdn.softpedia.com/images/news2/Cooperation-Betweeen-CERTs-and-Law-Enforcement-Is-Crucial-ENISA-Says-1.png)
Cooperation Between CERTs and Law Enforcement Is Crucial, ENISA Says
The agency released a report that contains recommendations on how to address current gaps
- Security
- By Eduard Kovacs
- November 27th, 2012
![Lack of Control over Privileged Accounts Is Often the Cause of Data Breaches Lack of Control over Privileged Accounts Is Often the Cause of Data Breaches](https://news-cdn.softpedia.com/images/news2/Lack-of-Control-over-Privileged-Accounts-Is-Often-the-Cause-of-Data-Breaches-1.jpg)
Lack of Control over Privileged Accounts Is Often the Cause of Data Breaches
Quest Software offers insight on how Privileged Account Management practices must be used
- Advisories
- By Eduard Kovacs
- November 26th, 2012
![Cyberattacks Cause Considerable Economic Damage to Governments, EP Says Cyberattacks Cause Considerable Economic Damage to Governments, EP Says](https://news-cdn.softpedia.com/images/news2/Cyberattacks-Cause-Considerable-Economic-Damage-to-Governments-EP-Says-1.png)
Cyberattacks Cause Considerable Economic Damage to Governments, EP Says
Members of the European Parliament believe urgent measures are needed
- Security
- By Eduard Kovacs
- November 23rd, 2012
![October 2012 Marked by US Election Spam, Report Reveals October 2012 Marked by US Election Spam, Report Reveals](https://news-cdn.softpedia.com/images/news2/October-2012-Marked-by-US-Election-Spam-Report-Reveals-1.png)
October 2012 Marked by US Election Spam, Report Reveals
The percentage of spam in email traffic dropped by 4.5% compared to the previous month
- Security
- By Eduard Kovacs
- November 23rd, 2012
![ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks](https://news-cdn.softpedia.com/images/news2/ENISA-Releases-Report-on-the-Use-of-Honeypots-to-Detect-Cyberattacks-1.png)
ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks
CERTs are not using such resources as much as they should
- Xbox
- By Andrei Dobra
- November 22nd, 2012
![Xbox 720 Could Get a Lower Priced Set-Top Box Version Xbox 720 Could Get a Lower Priced Set-Top Box Version](https://news-cdn.softpedia.com/images/news2/Xbox-720-Could-Get-a-Lower-Priced-Set-Top-Box-Version-1.jpg)
Xbox 720 Could Get a Lower Priced Set-Top Box Version
Microsoft is apparently working on a special, less powerful but lower priced device
- Spam Reports
- By Eduard Kovacs
- November 22nd, 2012
![UK Users Receive 148 Million Spam SMS Messages Each Month, Study Finds UK Users Receive 148 Million Spam SMS Messages Each Month, Study Finds](https://news-cdn.softpedia.com/images/news2/UK-Users-Receive-148-Million-Spam-SMS-Messages-Each-Month-Study-Finds-1.png)
UK Users Receive 148 Million Spam SMS Messages Each Month, Study Finds
Spammers could be earning as much as £20 million ($31 million) per month
- Security Fixes and Improvements
- By Eduard Kovacs
- November 21st, 2012
![ISF Releases Report to Help Organizations Deal with Security Breach Aftermath ISF Releases Report to Help Organizations Deal with Security Breach Aftermath](https://news-cdn.softpedia.com/images/news2/ISF-Releases-Report-to-Help-Organizations-Deal-with-Security-Breach-Aftermath-1.png)
ISF Releases Report to Help Organizations Deal with Security Breach Aftermath
Impact assessment, root cause analysis, and recommendations
- Security Blog
- By Eduard Kovacs
- November 21st, 2012
![Exploitation of Privileged Access Points: Common Vector for High-Profile Attacks Exploitation of Privileged Access Points: Common Vector for High-Profile Attacks](https://news-cdn.softpedia.com/images/news2/Exploitation-of-Privileged-Access-Points-Common-Attack-Vector-for-High-Profile-Attacks-1.png)
Exploitation of Privileged Access Points: Common Vector for High-Profile Attacks
Cyber-Ark reveals the common element of Subway, Saudi Aramco and Flame attacks
- Security Blog
- By Eduard Kovacs
- November 19th, 2012
![GFI October 2012 Report: Large Number of BlackHole Exploits Identified GFI October 2012 Report: Large Number of BlackHole Exploits Identified](https://news-cdn.softpedia.com/images/news2/GFI-October-2012-Report-Large-Number-of-BlackHole-Exploits-Identified-1.jpg)
GFI October 2012 Report: Large Number of BlackHole Exploits Identified
Users were lured to malicious websites with all sorts of spam messages
- Security Blog
- By Eduard Kovacs
- November 17th, 2012
![Over 10,000 Identity Fraud Rings in the US, Study Finds Over 10,000 Identity Fraud Rings in the US, Study Finds](https://news-cdn.softpedia.com/images/news2/Over-10-000-Identity-Fraud-Rings-in-the-US-Study-Finds-1.jpg)
Over 10,000 Identity Fraud Rings in the US, Study Finds
ID Analytics’ ID:A Labs reveals that most criminal organizations are composed of friends
- Internet Life
- By Eduard Kovacs
- November 16th, 2012
![Hundreds of People Prosecuted in the UK for Social Media Posts Hundreds of People Prosecuted in the UK for Social Media Posts](https://news-cdn.softpedia.com/images/news2/Hundreds-of-People-Prosecuted-in-the-UK-for-Social-Media-Posts-and-Emails-1.jpg)
Hundreds of People Prosecuted in the UK for Social Media Posts
1,286 British users were convicted in 2011 alone
- Security
- By Eduard Kovacs
- November 16th, 2012
![Organizations Worldwide Unable to Meet Privacy and Security Expectations Organizations Worldwide Unable to Meet Privacy and Security Expectations](https://news-cdn.softpedia.com/images/news2/Organizations-Worldwide-Unable-to-Meet-Privacy-and-Security-Expectations-1.png)
Organizations Worldwide Unable to Meet Privacy and Security Expectations
A study commissioned by Edelman reveals some interesting figures
- Security Blog
- By Eduard Kovacs
- November 15th, 2012
![31% of UK Mobile Phone Users Mistakenly Believe They Can “Stop” Text Spam 31% of UK Mobile Phone Users Mistakenly Believe They Can “Stop” Text Spam](https://news-cdn.softpedia.com/images/news2/31-of-UK-Mobile-Phone-Users-Mistakenly-Believe-They-Can-Stop-Text-Spam-1.jpg)
31% of UK Mobile Phone Users Mistakenly Believe They Can “Stop” Text Spam
Cloudmark has commissioned a study to analyze awareness and interaction with spam
- Security Blog
- By Eduard Kovacs
- November 14th, 2012
![65% of Organizations Suffer Three DDOS Attacks a Year, Study Finds 65% of Organizations Suffer Three DDOS Attacks a Year, Study Finds](https://news-cdn.softpedia.com/images/news2/65-of-Organizations-Suffer-Three-DDOS-Attacks-a-Year-Study-Finds-1.png)
65% of Organizations Suffer Three DDOS Attacks a Year, Study Finds
Radware has released a new report to detail such cyber threats
- Security
- By Eduard Kovacs
- November 13th, 2012
![Symantec Makes Cyber Security Predictions for 2013 Symantec Makes Cyber Security Predictions for 2013](https://news-cdn.softpedia.com/images/news2/Symantec-Makes-Cyber-Security-Predictions-for-2013-1.jpg)
Symantec Makes Cyber Security Predictions for 2013
Ransomware will replace scareware and cloud services will become more tempting targets
- Security
- By Eduard Kovacs
- November 9th, 2012
![Ransomware Helps Crooks Extort over $5 Million (€3.9 Million) per Year from Victims Ransomware Helps Crooks Extort over $5 Million (€3.9 Million) per Year from Victims](https://news-cdn.softpedia.com/images/news2/Ransomware-Helps-Crooks-Extort-Over-5-Million-3-9-Million-Per-Year-from-Victims-1.jpg)
Ransomware Helps Crooks Extort over $5 Million (€3.9 Million) per Year from Victims
Symantec has released a white paper that focuses on this threat