Tax Scam Season Is Here

It’s spring in the US and that means tax time. This is also a bumper time for tax scammers and to remind us of this the Internal Revenue Service (IRS) posted its Dirty Dozen list of tax scams for 2013. The IRS complies this list every year. Scams run all year round but right now is when they…

Read More

US “hacktivist” Says Network Attack is AT&T’s Failure

Andrew Auernheimer, the US “hacktivist” who broke into the network of AT&T said that the attack was done to highlight security failings. Its reported that Andrew Auernheimer aka Weev and Daniel Spitler stole email addresses from 120,000 iPad owners by exploiting a bug in the way AT&T set up its network. Due to this, Auernheimer…

Read More

Finland Awash With Unsecured SCADA Systems

Despite large scale security measures implemented globally thousands of unsecured SCADA systems have been discovered by security researchers in Finland. Testing last January revealed 2, 915 exposed systems running operations such as building automation, transport and water supply. Researchers from Aalto University looked at  responses from 185,000 Finnish IP addresses that hosted HTTP servers. They…

Read More

Advertising Botnet Steals Millions

A computer network generating millions of fake advert viewings has been discovered by British web analytics firm Spider.io. The network nicknamed “Chameleon” is made up of 120,000 home pc’s and costs advertisers around $6m per month. Spider.io reports that Chameleon simulated clicks on adverts on over 200 sites and said the botnet was responsible for up to nine…

Read More

Study finds 55 percent of SMBs were breached in 2012

Over half of small businesses surveyed by the Ponemon Institute as part of a recent study experienced some sort of data breach last year. Out of the affected businesses, a great deal of breaches were ignited internally, either by mistake or on purpose by employees and contractors.

Read More

We need more cybersecurity transparency

As companies now face threats from every angle—foreign, national, and internal—there seems to be a “who, me?” attitude when it comes to security. Many companies handle security incidents in a hush-hush manner, quietly sweeping these all-too-common occurrences under the rug, hidden from the public.

Read More