As cybercrime expands and evolves, a new study categorizes and describes the top five threats: data breaches, malware, DDoS, mobile threats and the industrialization of fraud – and they’re all interrelated.
Browsing: Malware and Vulnerabilities
A mobile developer has discovered what he claims is a security vulnerability in the Facebook Graph Search that allowed him to automate the compilation of a list of some 2.5 million phone numbers
Google’s Safe Browsing program is now flagging 10,000 suspect websites per day, the search giant announced in a blog post. The information is used to deliver automated warnings to Chrome, Firefox and Safari users.
A security firm is warning about as serious security vulnerability in Samsung’s Galaxy S4 devices, claiming that attackers can use it to silently send text messages.
Despite a high level of headline-grabbing hacks and the fact that criminal hackers run huge markets of information for sale upon request, most businesses whose confidential information has been hijacked don’t realize how much damage can be caused.
A recent survey shows that even before PRISM news broke, six out of ten consumers were concerned about the security of storing their content in social networking and cloud storage services.
Small business websites have overtaken porn and gambling sites as cyber criminals’ malware distribution tools of choice, according to Sophos director of technology James Lyne, who said the lack of skilled professionals to tackle this issue is leaving the UK wide open to attack.
Boardrooms need to “wake up” to the danger of cybercrime, according to a recent report.
File synchronisation services like Dropbox, Skydrive, iCloud and Ubuntu One are being increasingly used in organisations. The services themselves provide convenience and are often more secure than alternatives like email and FTP.
Today we have access to more information than ever before. With the huge resources of the Internet; a massive increase in cheap storage capacity; the phenomenal take up of Cloud computing and social media – new threats and vulnerabilities arise.