Cybercriminals Rely on DNS Resolvers to Amplify DDOS Attacks and Hide Their Origin

Cybercriminals Rely on DNS Resolvers to Amplify DDOS Attacks and Hide Their Origin

Host Exploit details these attacks in its World Host Report

Imperva Experts Reveal the Best Practices and Tactics to Mitigate Insider Threats

Imperva Experts Reveal the Best Practices and Tactics to Mitigate Insider Threats

The secret to a secure organization revolves around four key elements

Advanced Malware Allows Cybercriminals to Empty a Bank Account in One Go

Advanced Malware Allows Cybercriminals to Empty a Bank Account in One Go

AVG Technologies has released its Q3 2012 threat report

Number of Phishing Attacks Increased by 12% in First Half of 2012, Experts Find

Number of Phishing Attacks Increased by 12% in First Half of 2012, Experts Find

The APWG has released its report on phishing trends and domain name use

List of 2012’s Worst 25 Passwords Published, “Jesus” and “Ninja” Included

List of 2012’s Worst 25 Passwords Published, “Jesus” and “Ninja” Included

SplashData has released its annual report on password frequency

Spam in September 2012: Michelle Obama, Innocence of Muslims and Coupons

Spam in September 2012: Michelle Obama, Innocence of Muslims and Coupons

Most of the malware-laden emails were found to carry Backdoor.Win32.Androm.kv

United Nation Issues Warning: The Internet Is Used for Terrorist Purposes

United Nation Issues Warning: The Internet Is Used for Terrorist Purposes

The UN is trying to teach Member States how to use the Web to their own advantage

Q3, 2012 Report: XSS Named the Most Common Attack Type in Europe and US

Q3, 2012 Report: XSS Named the Most Common Attack Type in Europe and US

SQL Injection, Directory Traversals and CSRF attacks are also highly prevalent

Experts to Youths: Control Over Images and Videos Posted Online Can Be Easily Lost

Experts to Youths: Control Over Images and Videos Posted Online Can Be Easily Lost

The Internet Watch Foundation wants to raise awareness on Internet safety matters

Trend Micro Report for Q3, 2012: Zero-Days, Mobile Malware and Phishing

Trend Micro Report for Q3, 2012: Zero-Days, Mobile Malware and Phishing

The number of malicious Android apps has considerably grown in the past months

ENISA Midpoint Report: First European Cyber Security Month Is a Success

ENISA Midpoint Report: First European Cyber Security Month Is a Success

A number of events are planned to take place in the second part of ECSM

You Can Block or Report Annoying Pinterest Users Now

You Can Block or Report Annoying Pinterest Users Now

The site is adding the ability to better control who you have to deal with

Number of DDOS Attacks Declined, but Their Size Increased, Q3 2012 Study Finds

Number of DDOS Attacks Declined, but Their Size Increased, Q3 2012 Study Finds

Prolexic has released its quarterly attack report

Sophos Dirty Dozen Report: One out of Six Spam Messages Comes from India

Sophos Dirty Dozen Report: One out of Six Spam Messages Comes from India

Here's a list of the countries responsible for relaying spam this summer

27,000 Attacks from Abroad Hit China in 2012, US Responsible for 24% of Them

27,000 Attacks from Abroad Hit China in 2012, US Responsible for 24% of Them

A total of 7.8 million computers were affected by cyberattacks in the first half of 2012

11 European Countries Reported a Total of 51 Severe Outages for 2011

11 European Countries Reported a Total of 51 Severe Outages for 2011

An ENISA report shows that most incidents are caused by natural phenomena

Most of the Mass Distributed Malware in Q3 2012 Were Banking Trojans, Study Finds

Most of the Mass Distributed Malware in Q3 2012 Were Banking Trojans, Study Finds

Solutionary’s SERT issued its quarterly research report

 
Want more? Browse: