Don't-Miss Business security Stories

malware

Source code for Carberp financial malware is up for sale at a very low price, researchers say

The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB.

Spying

Prism doesn't have CIOs in a panic -- yet

Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.

Even Bitcoin probably can't withstand Prism's prying

In the aftermath of the revelation of Prism, the NSA's data collection program, the virtual currency Bitcoin has been pegged as a more private option; but the virtual currency may not be secure from government surveillance, either.

Spying

Does encryption really shield you from government's prying eyes?

Encrypting data may not guard against surveillance, some experts say, while others argue in favor of taking steps to protect privacy.

Spy-proof enterprise encryption is possible, but daunting

Data encryption could help businesses protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.

Security experts weigh in on Patch Tuesday priorities

Security experts share their insight and opinion on the June Patch Tuesday security bulletins from Microsoft.

Social sites beat retailers and banks for consumer protection and privacy

For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).

Cities search for solution to phone-theft epidemic

With smartphone theft exploding, businesses face extreme risks

The art and science of risk management

A new survey from Tripwire explores whether risk management is more science, or art.

Android security is sadly lacking, researchers reveal

Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina.

Critical IE update slated for Patch Tuesday

There are only five security bulletins scheduled for next week, but one is a Critical update for Internet Explorer.

Hacker publishes alleged zero-day exploit for older Plesk versions

A hacker released what he claims is a zero-day exploit for older versions of the Parallels Plesk Panel, a popular web-hosting administration software package, that could allow attackers to inject arbitrary PHP code and execute rogue commands on Web servers.

EU countries must be able to sentence hackers to two years, draft law says.

Hackers would face a minimum two-year prison sentence under a new European Union law approved by the European Parliament’s civil liberties committee on Thursday.