CDSA News Headlines

 

Netskope: Malware On The Rise In Cloud Apps Blessed By Enterprise IT Departments (CRN)

Cloud security vendor Netskope released its latest report Thursday assessing Software-as-a-Service usage for the first quarter of 2016, revealing a surge in the amount of malware d... More

Report: Criminals use email scams to steal $263M from U.S. companies (SC Magazine)

A report published by the Internet Crime Complaint Center (IC3) stated U.S. companies lost $263 million as a result of cybercriminal groups' email scams in 2015. The report note... More

The Chinese Hackers in the Back Office (New York Times)

Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and the... More

Slicing Into a Point-of-Sale Botnet (Krebs on Security)

Last week, KrebsOnSecurity broke the news of an ongoing credit card breach involving CiCi’s Pizza, a restaurant chain in the United States with more than 500 locations. What foll... More

Weekend Vulnerability and Patch Report, June 12, 2016 (Citadel Information Group)

Important Security Updates Google Chrome: Google has released Google Chrome version 51.0.2704.84 to address multiple vulnerabilities. Updates are available from within the brows... More

Is the ‘Six Strikes’ Anti-Piracy Idea Doomed? (Torrent Freak)

Five years ago the MPAA and RIAA teamed up with several major U.S. Internet providers, announcing their plan to shift the norms and behavior of BitTorrent pirates. The parties l... More

BYOD Security: How To Shift Device Control and Grant Users More Choice (Dark Reading)

Information Technology departments too often have rigid policies circumvented by end users seeking convenience. At the same time, many employees have flexible work environments and... More

Cyber Security 101: Why it Matters to Your Business (IT Pro Portal)

In a mobile-first, cloud-first world, where there’s so much powerful technology available to businesses to help prevent and counter cybersecurity threats, the fact still remains ... More

Here’s Why Cyber Security Should be a Key Part of M&A Due Diligence (Business Insider)

There was certainly a bumper crop of mergers and acquisitions last year. It’s a sure bet that before any of the 2015 M&A deals went through, however, the buyers looked very c... More

Now You Can Google Yourself Into Better Privacy and Data Protection (Naked Security)

Want to find out everything Google knows about you? Well, you can just Google yourself! Seriously. Googling your own name is the best way to find how deeply Google’s been digg... More

TeamViewer Beefs up Account Security After Rash of PC, Mac Hijacks (The Register)

TeamViewer is whacking anti-hacker protections into its remote-desktop tool – as its customers continue to report having their PCs and Macs remotely hijacked by criminals. Two... More

Researchers Uncover Affiliate Network for Ransomware (ThreatPost)

Ransomware as a business is maturing and nowhere is that better illustrated than in Russia, according to Flashpoint researchers. The security firm released two reports on Thursday,... More

Malware Devs Scour GitHub for New Ideas for Bypassing Android Security (Help Net Security)

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the large... More

Weekend Vulnerability and Patch Report, June 5, 2016 (Citadel Information Group)

Important Security Updates Apple iTunes: Apple has released version 12.4.1 (64-bit and 32-bit) of iTunes. Updates are available from Apple’s website. AVG: AVG has released ... More

How You Can Use Two-Factor Authentication to Protect Cloud Services (ZDNet)

How much are your private communications worth? How about your reputation? Your bank account? Your identity? These days, unless you go to extraordinary lengths, nearly every pie... More

The Delicate Balance in Data Breach Reporting (Bank Info Security)

Troy Hunt's free breach-notification service, Have I Been Pwned?, logs tens of thousands of visits per day, particularly if there's been a major data breach making news headlines. ... More

Cyber Crime Hit Businesses Hardest in 2015, Says IC3 Report (Threat Post)

Businesses were hit hardest by inbox-based scams in 2015 that robbed U.S. companies of $263 million. The numbers come from the FBI’s recently released 2015 Internet Crime Report ... More

FBI Report: Deconstructing the Wide Scope of Internet Crime (Dark Reading)

The FBI recently released its annual data dump from the Internet Crime Complaint Center (IC3), which offers up the consolidated information gleaned from a year's worth of criminal ... More

Beware of Keystroke Loggers Disguised as USB Phone Chargers, FBI Warns (ARS Technica)

FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wirel... More

Major DNS Provider Hit by Mysterious, Focused DDoS Attack (ARS Technica)

Unknown attackers have been directing an ever-changing army of bots in a distributed denial of service (DDoS) attack against NS1, a major DNS and traffic management provider, for o... More

Sign up for our newsletters
* indicates required
MESA Newsletters