Monday, May 6th, 2013
Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday.
The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...
Posted in Internet, Security, Software | No Comments
Sunday, May 5th, 2013
Internet Explorer 8 is still the most-used version of Microsoft's web browser family, according to data from Net Applications. Late Friday, Microsoft posted word that it had discovered an exploit in the browser but noted the issue issue does not appear to affect any other versions.
Microsoft's Security blog states the exploit could ...
Posted in Internet, Security, Windows | No Comments
Friday, May 3rd, 2013
The U.S. Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as “OpUSA” against websites of high-profile US government agencies, financial institutions, and commercial entities. But security experts remain undecided on whether ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 2nd, 2013
Even passwords considered “strong” by IT departments are often now vulnerable to hacking, according to professional services firm Deloitte. In Deloitte’s Technology, Media and Telecommunications Predictions 2013, the firm predicts that 90% of user generated passwords will be vulnerable to hacking this year.
Deloitte says that the weakness inherent in current password ...
Posted in Internet, Security | No Comments
Tuesday, April 30th, 2013
Nearly every week now we can read about a data breach case somewhere, where millions of user accounts and potential other sensitive data has been compromised. Most people are not even shocked by such news anymore, as it is starting to become humdrum.
One of the most common attacks used in ...
Posted in Coding, Internet, Security | No Comments