Purchasing services after following a link from our site earns us a commission and helps support our efforts. Thank You! Learn More

News

Feds & Public Victimized by Phony IRS Agent Scam

April 10, 2015

The Treasury inspector of the Internal Revenue Service has already received more than 366,000 complaints regarding tax returns filed by identity thieves. More than 3,000 people have been victimized and $15.5 million has already been pilfered. Officials are pushing hard to find the various culprits, but confidence has waned. For a more detailed article on […]

Read the full article →

Syrian Electronic Army Attacks Web Hosts

April 3, 2015

The Syrian Electronic Army, a pro-hacker group rumored to be tied with Syrian President Bashar al-Assad, is back in the news for attacking five of the most prominent web hosting companies. Bluehost, Justhost, Hostmonster, Hostgator, and FastDomain were all hacked by SEA after SEA accused them of hosting terrorist web sites on their servers. For […]

Read the full article →

Cisco IP Phones Have Eavesdroppers

April 3, 2015

Cisco IP Phones are popular for small businesses, but a newly discovered vulnerability could allow attackers to remotely eavesdrop on private conversations. While Cisco is aware of the issue, they are still working on a firmware patch to address this problem. In the meantime, administrators are advised to allow network access to only trusted users. […]

Read the full article →

DevOps Security Tips

April 2, 2015

While DevOps makes lives easier for organizations, many aren’t keeping up with security and compliance monitoring tools. It is important for the DevOps team to have security measures within the data pipeline in order for data to be closely monitored automatically and safely. For more DevOps tips, click here:: 10 Practical Security Tips for DevOps

Read the full article →

Does Hacking Back Really Help?

April 2, 2015

When your system has been hacked by attackers or a competitor, is the proper response to hack back? While legally inadvisable, many hurt egos try to confront their cyberattacks with one of their own, often leading to a mess on both sides. For a full article discussing the problems of hacking-back, click here:: Hacking Back: […]

Read the full article →

Online Banking Fraud Jumps 50% in the UK

April 1, 2015

Latest Financial Fraud Action UK figures have found that online banking fraud has risen 48% since 2013. If that’s not troubling enough, telephone banking fraud losses rose 20% in the last year. UK internet users are advised to keep their security software up to date and only shop on secure websites. For details on these […]

Read the full article →

50% of Android Phones Are Vulnerable to Malware

April 1, 2015

Palo Alto Networks exposed a vulnerability in Android OS that could be used to secretly install malware apps on almost half of existing Android devices. Taking advantage of legitimate apps that monitor subsequent app installs, a hacker can have a phone download and install malware apps instead of the apps users believe they are getting. […]

Read the full article →

U.S. Implores Private Companies to Fight Cyber Crime

March 31, 2015

U.S. Deputy Treasury Secretary Sarah Bloom Raskin urged companies to do more to fight against cyberattacks and cyber crime. Some short-term fixes she recommended included sharing information within the financial sector and start building legislation to protect the rights of internet users. For more on this story, click here:: U.S. urges companies to do more […]

Read the full article →

China Attacks GitHub with DDoS Assault

March 31, 2015

The popular coding website GitHub was rocked with a large-scale distributed denial of service (DDoS) attack for over 24 hours last Thursday. The attack is thought to have been originating from China, as the two most specific DDoS targets were GitHub projects that act as anti-censorship tools to help Chinese citizens circumvent the Chinese government’s […]

Read the full article →

Be Wary of Hotel WiFi

March 30, 2015

The free WiFi offered at your hotel might leave you exposed to hackers. Security researchers have found a critical vulnerability (CVE-2015-0932) in routers that many hotel chains depend on for distributing WiFi throughout their building. This vulnerability could infect malware and allow hackers to breach devices for data. For more on this troubling story, click […]

Read the full article →