2014
2015
2016
2017
2018
2019
2020
2021
2022
168 articles
- Antone Gonsalves for CIOOct 08 ’14
An Inside Look at Russian Cybercriminals
A detailed look at Russian cybercriminals focused on accessing online banking accounts reveals an effective hidden system for spreading malware through compromised websites.
The criminal operation, described in a report released Tuesday by email secur…
We found this article at:
- Antone Gonsalves for CIOOct 07 ’14
Did Researchers Help Hackers in Releasing USB Drive Exploit?
The debate over when security researchers should expose serious vulnerabilities has been rekindled with the recent release of exploit tools for a flaw in USB flash drive firmware.
Researchers Adam Caudill and Brandon Wilson released the tools last wee…
We found this article at:
- Antone Gonsalves for CIOOct 04 ’14
What To Do in the Aftermath of the JPMorgan Breach
The compromise of 10s of millions of JPMorgan Chase accounts poses the greatest risk of phishing attacks on consumers and small businesses, experts say.
JPMorgan, the nation's largest bank, disclosed Thursday in a Securities and Exchange Commission fi…
We found this article at:
- Antone Gonsalves for CIOOct 03 ’14
Android Browser Flaw Found to Leak Data
A security researcher has found another flaw in the Android browser that a cybercriminal could use to steal sensitive data.
The latest same-origin policy (SOP) bypass vulnerability is the second discovered by researcher Rafay Baloch, who discovered th…
We found this article at:
- Antone Gonsalves for CIOOct 02 ’14
Shellshock Attackers Targeting NAS Devices
Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.
The attackers were taking advantage of a publicly disclosed security w…
We found this article at:
- Antone Gonsalves for CIOOct 01 ’14
Young Adults Clueless on Cybersecurity Profession
The cybersecurity profession and its role in keeping the Internet safe is lost among young adults, who are therefore less likely to pursue a career in the field, a survey shows.
Millennials aged 18 to 26 understand the importance of protecting themsel…
We found this article at:
- Antone Gonsalves for CIOSep 30 ’14
6 Key Defenses Against Shellshock Attacks
The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.
Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, th…
We found this article at:
- Antone Gonsalves for CIOSep 27 ’14
VoIP Phone Systems at Risk of Shellshock Bash Attacks
The Shellshock Bash bug was found in a typical voice-over-IP (VoIP) phone system, opening up the possibility that many more of the business communication systems could be vulnerable if attacked.
The bug uncovered this week in a widely used component o…
We found this article at:
- Antone Gonsalves for CIOSep 25 ’14
New Toolkit Seeks Routers, Internet of Things for DDoS Botnet
Security researchers have recently discovered a toolkit capable of infecting computers, routers and Internet of Things devices to launch large-scale simultaneous DDoS attacks.
DDoS mitigator Akamai Technologies uncovered the toolkit, dubbed Spike, abo…
We found this article at:
- Antone Gonsalves for CIOSep 24 ’14
iPhone 6 Fingerprint Scanner Found Accurate Enough For Apple Pay
Apple's iPhone 6 fingerprint scanner has a level of accuracy that makes it a solid authentication tool for people planning to use the smartphone in place of a credit card for in-store purchases, research shows.
[ Video: What You Need to Know About iPh…
We found this article at: