Quantcast

Latest Web threat Stories

2010-12-17 00:00:43

Websense Security Labs Research Shows Upsurge of Attacks Aimed at Facebook, iPads, and Smartphones San Diego, CA (Vocus) December 16, 2010 If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year: Prediction #1: The Stuxnet sequels are coming, stay tuned for "When State-sponsored Malware Attacks!"     Stuxnet targeted critical industrial infrastructure, but it was only a preview. Based on how long it...

2010-12-09 10:00:00

CUPERTINO, Calif., Dec. 9, 2010 /PRNewswire/ -- With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic will be to put a new spin on social engineering by way of "malware campaigns," by bombarding recipients with email that drop downloaders containing malware. All this will largely be made possible because of the Internet. Already, Trend Micro threat researchers have found...

2010-12-07 12:42:00

BOULDER, Colo., Dec. 7, 2010 /PRNewswire/ -- Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for large corporations. But today, it's a multi-million dollar industry that's impacting businesses of every size. In fact, according to the U.S. Federal Deposit Insurance Corporation (FDIC), online scams targeting small businesses cost U.S. companies $25 million in the third...

2010-11-02 10:10:00

CUPERTINO, Calif., Nov. 2, 2010 /PRNewswire/ -- Viruses, Trojans, data-stealing malware, and data leaks were rated as big IT concerns among small businesses, according to Trend Micro's 2010 corporate end user survey, which included 1600 end users(1) in the U.S., U.K., Germany and Japan. On average, 63 percent of small businesses(2) were most concerned by viruses, 60 percent by Trojans, 59 percent by data-stealing malware (malware designed by cybercriminals specifically to steal data),...

2010-11-02 10:00:00

CUPERTINO, Calif., Nov. 2, 2010 /PRNewswire/ -- Small businesses face an increasingly dynamic and targeted threat landscape: Not only are there 1.5 new pieces of malware being created every second(1), cybercriminals are aggressively preying upon smaller businesses that are often strapped for IT resources and security expertise at a growing rate. Trend Micro made a commitment to solving small business security needs six years ago when it first introduced its Worry-Free product line to the...

2010-10-26 10:00:00

CUPERTINO, Calif., Oct. 26 /PRNewswire/ -- Trend Micro has earned a "Recommend" rating for its over-time protection rating and socially-engineered malware blocking score in the Q3 2010 NSS Labs Consumer Anti-Malware Products Group Test Report. While the average time for a security vendor to block a malicious site was 13.5 hours, Trend Micro had the fastest time, blocking malicious sites in just over three hours. Not sponsored or funded by any security vendor, the NSS Labs test emulated...

2010-10-04 10:00:00

CUPERTINO, Calif., Oct. 4 /PRNewswire/ -- During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April. Despite common perception, porn consists of only 4 percent of all spam. Commercial, scams-based and health/medical categories make...

2010-09-15 13:18:00

BOULDER, Colo., Sept. 15 /PRNewswire/ -- As the bad guys look for new ways to exploit holes in technology, they have become increasingly financially motivated, with organized crime picking up where the 'hobbyist hacker', doing it for kicks, left off. Perhaps the most significant trend is towards more intelligent, targeted attacks on both individuals and businesses through increased Web presence, social media, and so on. So, what kinds of web security threats are we talking about? Here...

2010-08-13 17:12:00

DURANGO, Colo., Aug. 13 /PRNewswire/ -- We are living in an information age--and always-on, instant communication is a necessity for doing business. To work efficiently with customers and business partners, organizations must provide their employees with information where and when they need it. So businesses must maintain an online presence that offers 24/7 access to information for both clients and employees. Due to the increasing popularity of mobile technologies, like smart phones and...

2010-07-15 07:00:00

BROOMFIELD, Colo., July 15 /PRNewswire/ -- eSoft, Inc., a leading network security company that provides integrated Internet security solutions, announced today that IT PRO, the UK's most comprehensive enterprise IT news and reviews site, has awarded eSoft five stars in a review of its InstaGate 806 security gateway. IT PRO's Dave Mitchell notes in his review that he was impressed by the InstaGate's ease of use and cost-effectiveness, and by the strong performance of eSoft's own security...


Word of the Day
cacodemon
  • An evil spirit; a devil.
  • A nightmare.
  • In astrology, the twelfth house of a scheme or figure of the heavens: so called from its signifying dreadful things, such as secret enemies, great losses, imprisonment, etc.
'Cacodemon' comes from a Greek term meaning 'evil genius.'
Related