Home Tags Threat

Tag: threat

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence to its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

Microsoft Says Fireball Threat ‘Overblown’

Check Point has toned down its initial estimates on the number of Fireball malware infections from 250 million machines and 20 percent of corporate networks to 40 million computers.

Microsoft claims Fireball malware enterprise threat ‘overblown’

Microsoft has cast doubt on Check Point's claims that Fireball has a hold in one in five corporate networks.

12-year-old security hole in Unix-based OSes isn’t plugged after all

“Stack Clashrdquo; poses threat to Linux, FreeBSD, OpenBSD, and other OSes.

Atlantic faces the rare prospect of two active tropical storms in...

Two active tropical storms at the same time in June? Happened just three times.

Hacker Bypasses Microsoft ATA for Admin Access

Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries

Previously unknown threat actor has extracted hundreds of thousands of dollars from Canadian companies in a vicious cyberattack campaign that dates back to 2013, FireEye says.

Most Organizations Not Satisfied with Threat Intelligence

Information Security Forum survey finds just one quarter of companies surveyed say threat intelligence technology is delivering on its promise.

Login-stealing phishing sites conceal their evil with lots of hyphens in...

Compromised domains target Android users with fake login pages for cloud services.

How Smart Cities Can Minimize the Threat of Cyberattacks

As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities.

How Smart Cities Can Minimize the Threat of Cyber Attacks

As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities.

Two Tickets as Bait

Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in this: they published posts that mentioned Emirates, Air France, Aeroflot, S7 Airline, Eva Air, Turkish Airlines, Air Asia, Air India, and other companies.

Hexadite to Bring More Threat Detection Muscle to Windows 10

NEWS ANALYSIS: The acquisition of Hexadite will be new threat analysis capabilities based on artificial intelligence and machine learning to Microsoft's Windows Defender Advanced Threat Protection.