Antivirus is Dead: Long Live Antivirus!

Wednesday, May 7th, 2014

An article in The Wall Street Journal this week quoted executives from antivirus pioneer Symantec uttering words that would have been industry heresy a few years ago, declaring antivirus software “dead” and stating that the company is focusing on developing technologies that attack online threats from a different angle. This hardly ...

Vulnerability in Internet Explorer Could Allow Remote Code Execution

Sunday, April 27th, 2014

Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses ...

3 Million Customer Credit, Debit Cards Stolen in Michaels, Aaron Brothers Breaches

Thursday, April 17th, 2014

Nationwide arts and crafts chain Michaels Stores Inc. said today that two separate eight-month-long security breaches at its stores last year may have exposed as many as 3 million customer credit and debit cards. The disclosure, made jointly in a press release posted online and in a statement on the company’s Web site, offers the first ...

LaCie admits to year-long credit card breach

Tuesday, April 15th, 2014

LaCie is the latest major retailer and tech company finding itself to be the target of a major security breach by unknown assailants. The French hardware company confirmed in a statement on Tuesday that malware successfully made its way through to access sensitive customer information stemming from transactions on its website. Here's where things ...

Zeus malware found with valid digital certificate

Friday, April 4th, 2014

A recently discovered variant of the Zeus banking Trojan was found to use a legitimate digital signature to avoid detection from Web browsers and anti-virus systems. Security vendor Comodo reported Thursday finding the variant 200 times while monitoring and analyzing data from users of its Internet security system. The variant includes ...