All posts by Chris Tribbey

Weekend Vulnerability and Patch Report, Nov. 16, 2014 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 15.0.0.223 to fix at least 18 highly critical vulnerabilities reported in previous versions. Updates are ... More

New Ponemon Report Shows Cybercrime is on the Rise (Tech Republic)

It's that time of the year: the Ponemon Institute just published their 2014 Global Report on the Cost of Cyber Crime. "Our goal is to quantify the economic impact of cyber attacks ... More

How to protect Your iPhone from Wirelurker, the First iOS Malware (Christian Science Monitor)

A new report from Palo Alto Networks says that a new malware, called Wirelurker, is able to infiltrate iOS devices. Though Wirelurker shows possible vulnerabilities in the iPhone, ... More

Mac Security Flaw ‘Rootpipe’ Puts Business Data at Risk (Business News Daily)

All Mac business users, listen up. Details of a vulnerability in Macs have just been released, and you won't like the risks it poses for your company. Called "Rootpipe," this secu... More

How to Take a Forward-Looking Approach to Cybersecurity (Journal of Accountancy)

Although many companies are seeing cybersecurity threats rise, many lack the resources to handle these risks, a new global survey shows. Two-thirds (67%) of organizations report f... More

Workplace Privacy: Big Brother Is Watching (Dark Reading)

The technological sophistication of employee monitoring tools available today gives companies the power to scrutinize virtually every move an employee makes using keyboard logging,... More

From Malware To Breach (Dark Reading)

Got malware? More than likely you do, but don't panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new ... More

iOS 8 Vs. Android: How Secure Is Your Data? (Dark Reading)

Apple recently released iOS 8, several updates, and two iPhone 6 models. There has been plenty of noise around the releases, from the botched 8.0.1 update to the Touch ID fake fing... More

Still Spamming After All These Years (Krebs on Security)

Last month, security experts at Cisco blogged about spam samples caught by the company’s SpamCop service, which maintains a blacklist of known spam sources. When companies or Int... More

Texan Charged in First Bitcoin Securities Fraud Ponzi Case (Reuters)

A Texas man who operated Bitcoin Savings and Trust was charged on Thursday with bilking his investors, in what prosecutors called the first federal criminal securities fraud case a... More

Weekend Vulnerability and Patch Report, Nov. 9, 2014 (Citadel Information Group)

Important Security Updates Apple iCloud: Apple has released an update for iCloud for Windows. Updates are available from Apple’s website. Avira Free Antivirus: Avira has releas... More

Maker of Apple Pay Competitor Has Already Been Hacked (Recode)

You can’t make this stuff up. MCX, the retailer consortium behind Apple Pay competitor CurrentC, has already been hacked, according to an email sent out to those people who have... More

Data Breaches Jump in California, Expected to Keep Climbing (Los Angeles Times)

Data breaches soared last year in California as cybercriminals leaped over digital security gates to endanger the personal data of millions of consumers, California Atty. Gen. Kama... More

Hacked: The Escalating Arms Race Against Cybercrime (The Globe and Mail)

Martin Knuth is one of Home Depot’s most loyal customers. But after the home improvement giant revealed last month that hackers had accessed the confidential credit card informat... More

You Are Responsible for Your Own Internet Privacy (CIO)

Stan Stahl knows about the shady world of high-tech security and false privacy. Stahl helped secure teleconferencing at the White house and the communications network controlling t... More

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data (Wired)

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left m... More

Hackers Can Use the Samsung Find My Mobile Feature to Attack Phones (Mashable)

Most smartphones now come with built-in tracking systems that allow users to remotely lock or wipe their phones if they're misplaced or stolen. The feature intends to offer an ext... More

CryptoWall Ransom Infections Spike to 830,000 in Matter of Weeks (Tech World)

Dell SecureWorks has updated its figures on the number of PCs infected by the awful CryptoWall ransom malware and the news isn’t good – the number of systems has spiked suddenl... More

How to Tell Data Leaks from Publicity Stunts (Krebs on Security)

In an era when new consumer data breaches are disclosed daily, fake claims about data leaks are sadly becoming more common. These claims typically come from fame-seeking youngsters... More