Stats confirm that trojans spreading, malware being built at record rates

Monday, May 6th, 2013

Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday. The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...

Microsoft confirms exploit in Internet Explorer 8

Sunday, May 5th, 2013

Internet Explorer 8 is still the most-used version of Microsoft's web browser family, according to data from Net Applications. Late Friday, Microsoft posted word that it had discovered an exploit in the browser but noted the issue issue does not appear to affect any other versions. Microsoft's Security blog states the exploit could ...

DHS: ‘OpUSA’ May Be More Bark Than Bite

Friday, May 3rd, 2013

The U.S. Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as “OpUSA” against websites of high-profile US government agencies, financial institutions, and commercial entities. But security experts remain undecided on whether ...

More than 90% of passwords are vulnerable to hacks

Thursday, May 2nd, 2013

Even passwords considered “strong” by IT departments are often now vulnerable to hacking,  according to professional services firm Deloitte. In Deloitte’s Technology, Media and Telecommunications Predictions 2013, the firm predicts that 90% of user generated passwords will be vulnerable to hacking this year. Deloitte says that the weakness inherent in current password ...

What’s in a Password?

Tuesday, April 30th, 2013

Nearly every week now we can read about a data breach case somewhere, where millions of user accounts and potential other sensitive data has been compromised. Most people are not even shocked by such news anymore, as it is starting to become humdrum. One of the most common attacks used in ...