Phishing attacks surge with 87 percent growth over last year, warns Kaspersky

https://www.theinquirer.net/IMG/110/258110/kaspersky-logo-new-270x167.jpg?1368437256

Researchers at Kaspersky Lab have reported significant growth in phishing attacks over the last year.

In a study entitled “The Evolution of Phishing Attacks”, Kaspersky said it found 37.3 million out of its 50 million customers running its security products that were at risk of being phished from 2012 to the present, an 87 percent increase over the same period between 2011 and 2012.

via https://news.hitb.org/content/phishing-attacks-surge-87-percent-growth-over-last-year-warns-kaspersky

Malwarebytes unveils ExploitShield-based Anti-Exploit Beta

https://cdn.i.haymarket.net.au/Utils/ImageResizer.ashx?n=https%3a%2f%2fi.haymarket.net.au%2fNews%2fMalwarebytesAntiExploitFull.png&h=480&w=640

Malwarebytes has released the first public beta of Malwarebytes Anti-Exploit, a rebranded and improved version of ZeroVulnerabilityLabs’ ExploitShield.

Just as in its previous incarnation, Anti-Exploit is an extremely easy-to-use tool which protects popular applications from zero-day exploits, web-based vulnerability exploits and more.

via https://news.hitb.org/content/malwarebytes-unveils-exploitshield-based-anti-exploit-beta

Could terrorists remotely crash your car?

Could a 14-year-old computer hacker in Indonesia remotely take over control of your car as you drive down the Interstate, cause the car to dangerously accelerate and and kill you by crashing it? That’s the scenario raised and explained by AOL Autos in a story about the threat of terrorists and cars — and one that drew a fairly quick rebuke from … (more)

via https://www.topix.net/tech/computer-security/2013/06/could-terrorists-remotely-crash-your-car?fromrss=1

Lock up admin accounts to stop hackers, says Cyber-Ark

Hackers typically target privileged admin accounts to gain access to all computer systems in an organisation, says David Higgins, senior sales manager Cyber-Ark “In many organisations, these accounts are not well managed or controlled, giving hackers unfettered, unaccountable access,” he told the Whitehall Media Identity Management 2013 conference … (more)


Original news article at https://www.topix.com/tech/computer-security on June 20, 2013 at 06:09AM

Tech Terminology De-mystified – Big Data

Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process the data within a tolerable elapsed time. Big data sizes are a constantly moving target, as of 2012 ranging from a few dozen terabytes to many petabytes of data in a single data set. The target moves due to constant improvement in traditional DBMS technology as well as new databases like NoSQL and their ability to handle larger amounts of data. With this difficulty, new platforms of “big data” tools are being developed to handle various aspects of large quantities of data.
Continue reading “Tech Terminology De-mystified – Big Data”

Use This Powerful Microsoft Tool to Provide Better Security for Windows Programs

Zero-Day Exploits. Unpatched security holes. Security weaknesses that the hackers have discovered but haven’t revealed. These security problems are all too common and conventional anti-malware is no help. So what is the PC user to do? Here is some powerful free security software from Microsoft that can help.

https://www.techsupportalert.com/content/use-powerful-microsoft-tool-provide-better-security-windows-programs.htm


Original news article at https://feeds.feedburner.com/gizmosbest on June 19, 2013 at 02:41PM