For years, security vendors have warned users to be careful about unsolicited emails. Clicking on embedded links in these emails, they say, could be dangerous, as could opening attachments that come with them. That includes emails purporting to be from couriers such as DHL and UPS, which could in fa...
Twitter was hit by what's called an "onMouseOver" attack this week that affected thousands of users. The attack exploited a security flaw in Twitter, Bob Lord, a member of the site's security team, wrote on the company's blog. Users dubbed the hole the "onMouseOver" flaw because the first attack tur...
As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...
As the frequent news reports of data breaches attest, maintaining data security is a tough row to hoe -- even for large enterprises. It's even harder for small and medium-sized businesses, which don't have the money or IT resources their larger counterparts have. The plethora of threats is daunting,...
With the political election season ramping up, spammers are again using news headlines about the candidates to saturate in-boxes. Researchers have uncovered two new spam clusters with subject lines relating to Barack Obama. At certain points, one of these spam runs accounted for up to 18 percent of ...
A federal court has awarded MySpace nearly $230 million in its suit against Sanford Wallace and his partner Walter Rines -- aka the "Spam King." The judgment -- especially given the size of the award -- represents a decided victory for e-commerce sites in their costly battle against spam. This is th...
Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...
The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops. That said, IT security and control firm Sophos recently issued a warning about potential virus infections targeting Linu...
The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...
For the second time this year, hackers have victimized the University of Missouri. The names and Social Security numbers of 22,396 current or former students who were employed by UM during 2004 may have been compromised, according to university officials. The hacker or hackers reportedly gained acce...
"Never, ever put client data on a laptop -- and if you absolutely must, keep that laptop physically attached to your body," says Sharon Klein, a partner with Pepper Hamilton who counsels clients on privacy issues and and advises them on how to deal with the loss of sensitive customer data. Besides t...
Last month, Web-security firm MessageLabs said that for the first time ever it had recorded more e-mails bearing phishing attacks than those containing viruses or other malware. January's MessageLabs Intelligence Report also found that phishing attacks were becoming increasingly sophisticated, which...
Hackers on Tuesday launched a denial-of-service attack against at least three of the 13 root servers that maintain the Internet's domain name system. The attacks, which lasted for 12 hours, reportedly targeted the server that maintains the dot-org suffix, and the servers at the Department of Defense...
Professional cyberthieves and organized crime rings are looking to cash in on stolen identities and are releasing an increasing amount of malware in the process. McAfee predicts the following disturbing trends: a rise in the number of password-stealing Web sites that use fake sign-in pages for popul...
Unsolicited e-mail is an old Internet nemesis, but spammers have come up with a new twist, and it's causing corporate and individual users alike e-heartburn. It's called "image spam," and it's waiting in an in-box near you. Image spam contains little ordinary text to analyze. Instead, it uses the .g