Cyber Attacks Don’t Die, They Evolve

cyber attacks

Cybersecurity often feels like taking one step forward and two steps back. An attack will appear, the security community will respond, and eventually the threat will be eradicated. Then, a few months down the road, the threat reappears in a newer and stronger form. Most commonly, it’s evolved to specifically bypass the defenses created to combat it. This has always been true of cyberattacks. The earliest hackers searched for ways to tweak or re-purpose code after encountering a new defense. Or, rather than search for new vulnerabilities, they found new…

Read More

Research shows retailers in 2011 made most anti-fraud progress in over a decade

Cybertheft

Visa-owned CyberSource has unveiled the outcomes of its thirteenth annual e-commerce fraud survey, which showed that retailers are beginning to make important headway in the battle against fraud, even though it is ongoing. The percentage of the number of orders that were found to be fraudulent fell to 0.6 percent in 2011, from having been 0.9 percent in 2010. It has now reached the lowest point that has been seen in the thirteen years since the annual study began. However, the survey also found that the cost of fighting against…

Read More

AVG releases report to shed light on the mobile security threat environment worldwide

mobile security smartphone kill switch

Leading internet and mobile security provider, AVG Technologies, has unveiled its “AVG Community Powered Threat Report – Q4 2011” which helped to provide a better understanding of the worldwide mobile security threat environment through background information, trend analysis, and insight. Among the most notable elements within the quarterly report is the information that it shared regarding QR code risks, rootkit persistence, and the theft of digital certificates through the bypassing of mobile phone security. Though cybercrime was once simply a matter of vandalizing sites and other elements of the web,…

Read More

The 2011 top tech headlines

Technology News

This year saw a number of major events in the technology industry, bringing surprising and attention grabbing headlines to the news throughout every month. Among the top stories in 2011 in the tech industry were the following: • The death of Steve Jobs – This was one of the top stories of the year for any category, not just tech. His passing brought about a reaction barely seen for the head of a corporation. On October 5 – a mere six weeks after he announced that he was retiring from…

Read More

Malicious QR code found by Kaspersky

QR Code Security

One of the first malicious QR codes has been found by Kaspersky, the acclaimed Internet security company. Until now, the prospect of malicious codes has been nothing more than a tentative concern, though many security companies has been warning of the time when QR codes would become devious anti-security tools. Security professionals had warned that malicious codes could be very effective due to the willingness of consumers to scan any codes they find. Kaspersky reported the finding on its SecureList blog. It was only a matter of time before someone…

Read More

AVG warns that QR codes are not as risk free as they appear to be

QR Code Security

The illustrious internet security company AVG has been warning of an impending wave of cyber crime for years. The company has made a name for itself combating the threats present on the Internet, but now hackers are using a new tool that the company cannot protect anyone against: The QR code. According to AVG, the unassuming little barcodes have been causing a problem in online security lately. The problem lies in the inviting nature of the codes. QR codes are a popular marketing tool whose expansion in the realm of…

Read More

QR Codes – An unexpected tool for crime

QR Code Security

There are many good qualities surrounding QR codes, but there is also a darker side to the black and white barcode. This dark side, however, is not inherent in the codes themselves; rather it is a product of maliciousness stemming from the sordid world of cyber crime. The codes are famed for the convenience and ease of use, a fact that can be easily exploited by anyone that has the mind to do so. As QR codes continue to become more popular, cyber criminals are looking to use the codes…

Read More

NEWS FLASH…Cyber crime ring caught!

While we went about our daily routines last Tuesday, the FBI was playing Superhero and shutting down an enormous cyber crime ring. More than two million computers, mainly in the U.S. had been infected and used to retrieve delicate information, such as; account information and password information. The suspected criminals behind this operation were suspected to be a Russian crime group. The virus nicknamed “Coreflood” could be responsible for more than 100 million dollars stolen from business accounts and individuals. The Justice Department is continuing their investigation against the group…

Read More