1. Technology

Top Cyber Threats for 2014


As we look forward to new and improved technologies in 2014, we must also raise awareness on the new cyber threats that will come with these advancements. McAfee’s 2014 Top Cyber Threats gives us a good indication of what to expect for the New Year.

Antivirus Software Spotlight10

Bootleg Version of Card Recon Used by Cybercriminals

Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.

Android SMS Worm: Selfmite

AdaptiveMobile researchers reported finding a piece of Android malware known as Selfmite that spreads like a worm by sending out SMS messages to infected users’ contacts.

What's an Amplified DDoS Attack?

The purpose of a DDoS (distributed denial-of service) attack is to disrupt the activity of a service by flooding the servers with so much junk traffic that they run out of resources to process it.

Controlling Malware from the Cloud

Researchers at Trend Micro released a blog post detailing the company’s findings regarding botnets and malware being hosted and controlled through cloud servers.

TrueCrypt Not Dead

On Wednesday, May 28th, TrueCrypt users were wondering why the anonymous developers of TrueCrypt suddenly kill the project and recommended a Microsoft encryption tool, BitLocker, instead. TrueCrypt was an open source software program that enabled you to encrypt your computer files using keys that were protected by a separate TrueCrypt passphrase.

How to Keep Your Digital Life Safe

Hackers are becoming more of a threat than ever before. Within the past few months, we’ve seen big corporations such as Microsoft and eBay become victims of security breaches. With cybercrimes on the rise, this is a good time to strengthen your online security practices. Here are some tips that may help secure your digital life from cyber breaches and attacks.

Half of Anti-Virus Apps Fail to Block Zero-Day Malware

Lastline Labs, a cybersecurity research team (Engin Kirda, Christopher Kruegel, and Giovanni Vigna), conducted a research on Anti-virus technology and how they handle the latest malware threats.

Be Cautious How You Change Your Apple ID Password

Symantec has released an advisory to Apple device owners to “keep an eye out for emails attempting to phish for Apple ID login credentials,” showing various examples of how cybercriminals attempt to trick users into handing over their passwords.

Compromised Apple IDs Used to Hold iPhones for Ransom

Cybercriminals are using stolen Apple credentials to lock iPads, iPhones, and Macs and are doing this for ransom. The target users are mainly from Australia and New Zealand, but there are also some reports of victims within the United States.

eBay Security Breach

The eBay security breach exposed customers' private information including mailing addresses, email addresses, date of births, phone numbers, and possibly additional information.

You can opt-out at any time. Please refer to our privacy policy for contact information.

©2014 About.com. All rights reserved.