January 4, 2016 Cross-Platform Cryptoware Is Here 2 min read - A new malware called Ransom32 is a piece of cryptoware written in what is essentially JavaScript, making it tough to detect on all operating systems.
December 30, 2015 Cybercrime Has a New Entry Point: Smart TVs 2 min read - Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.
December 30, 2015 Malware Proxies: The New Cybercriminal Currency? 2 min read - Are malware proxies that take over victim computers becoming the new go-to for cybercriminals? They may be the next step for sophisticated attackers.
December 30, 2015 Personal Data of 191 Million Voters Compromised by Misconfigured Database 2 min read - A security researcher recently found 191 million people's personal data is available on the Internet thanks to a misconfigured voter database.
December 29, 2015 Business Offers Raspberry Pi Money to Preload Malware 2 min read - The Raspberry Pi Foundation was offered money by an unknown party that asked to include malware files in its downloads, an offer it rebuffed.
December 29, 2015 Joomla Security: Big Hits for New Vulnerability 2 min read - A recently discovered Joomla security vulnerability could allow cybercriminals to score some big hits against organizations and their servers.
December 29, 2015 Digital Currency Divide: Bitcoin, Decred and the Virtual Finance Future 2 min read - A team of developers is working on creating a new digital currency to challenge bitcoin. Can the proposed currency improve on bitcoin's weaknesses?
December 28, 2015 Whaling Dominates the Latest Wave of Phishing Attacks 2 min read - Phishing attacks combined with social engineering aimed at employees is called whaling, and it's the latest hot cybercrime trend.
December 23, 2015 Best Practices Can Fix Windows and Kerberos Password Security Problems 2 min read - The combination of Windows and Kerberos could be a toxic one for password security, but many top concerns can be mitigated with a few best practices.
December 22, 2015 Xmas Hit List: Three Security Vulnerabilities Unwrap Critical Risks 3 min read - A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.