Similar Articles |
|
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews June 16, 2011 |
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. |
InternetNews August 12, 2005 Tim Gray |
Attack Launches 19 Forms of Malware A highly complex Trojan was discovered on a U.S. site with a Russian-registered domain. |
InternetNews February 9, 2010 |
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. |
PC Magazine May 1, 2010 Albanesius & Rhey |
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. |
InternetNews May 19, 2009 |
Gumblar: Biggest Threat on the Web Today? A new trojan has grown quickly, and experts aren't mincing words in describing the danger. |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. |
InternetNews December 3, 2010 |
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. |
InternetNews October 29, 2009 |
Two-Headed Trojan Targets Online Banks New Trojan uses "two-pronged payload" to swipe log-in information, steal electronic funds. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
InternetNews May 12, 2010 |
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. |
InternetNews February 26, 2009 Richard Adhikari |
Microsoft Clamps Down on Excel Zero-Day Attack Microsoft is taking steps to protect customers from attacks through a zero-day flaw in Microsoft Excel discovered earlier this week. |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
Bank Technology News September 2009 Rebecca Sausner |
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. |
InternetNews February 7, 2008 Andy Patrizio |
Web 2.0: Unsafe At Any Speed? People who specialize in Web security are saying Web 2.0 as it is now can't be secured. Should we keep on this path? |
InternetNews July 31, 2006 Clint Boulton |
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
InternetNews September 15, 2009 |
Malware Ads Hit New York Times Media company's advertising staff approved bogus Vonage ad that distributed malware. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. |
InternetNews December 23, 2008 Sean Michael Kerner |
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. |
InternetNews October 17, 2008 Richard Adhikari |
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. |
InternetNews October 16, 2007 Andy Patrizio |
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
InternetNews April 12, 2011 |
HP Fortifies Real Time Security New HP Fortify Real-Time Hybrid Analysis solution takes aim at dynamic threats. |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
InternetNews June 11, 2010 |
Symantec Warns of Latest World Cup Malware Researchers at software-security firm detect a two-pronged malware attack targeting executives at major Brazilian firms, using the World Cup as a lure. |
InternetNews August 16, 2010 |
Symantec Uncovers Another Sneaky Spam Scam Latest Trojan conceals itself in innocent-looking attachments designed to get you or someone you know to open up the offending file. |
InternetNews February 20, 2009 Richard Adhikari |
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |
Science News April 25, 2009 |
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews December 17, 2008 Richard Adhikari |
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. |
InternetNews January 18, 2011 |
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
InternetNews February 7, 2007 Ed Sutherland |
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. |
InternetNews May 25, 2005 Tim Gray |
'Star Wars' Flavor Trojan Targets IM The new instant messaging threat is after Yahoo IM users. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. |