Bah-Humbug: Targeting Children’s Identities During the Holiday Season

Two recent massive breaches appear to be targeting children’s identities—attacks on VTech and Hello Kitty. Stealing the identities of children is not only far more morally egregious than targeting adults, the crimes will likely not be uncovered for many years—no one expects their child’s identity to be stolen, and therefore do not monitor for such activity. It is usually detected when a child matures and seeks to secure credit for a student loan or first auto loan, only to find these credit facilities unavailable at a critical point in young adulthood.

Share this:

Christmas Spam, And We Don't Mean the Canned Stuff

It's the time to be jolly! Fa la la la la la la la la la...

Share this:

Rovnix Downloader Evades Sinkholing

The Rovnix downloader malware is now capable of checking for sinkholing of its domains before connecting to them to evade detection by security tools. This is a new capability not previously observed in malware operations.

Share this:

dinCloud: Security Experts Share Thoughts on What Measures Organizations Should Implement to Secure their Cloud Environments

Cloud security has always been a hot topic, especially more recently when you consider the multiple high profile outages with large cloud providers like Amazon, GoDaddy, and Google Aps.

Share this:

ThreatSTOP Joins Microsoft Enterprise Cloud Alliance

ThreatSTOP has joined the Microsoft Enterprise Cloud Alliance to deliver our cloud-based, automated threat protection service to enterprise customers using Microsoft Azure. This collaboration highlights ThreatSTOP’s commitment to better protect customers’ data both on-premises and in the cloud, enabling businesses to take advantage of Azure flexibility, scale and innovation.

Share this:

Biggest Breaches of 2015 Recap

It's that time of year: Tim Greene who covers security for Network World has published a great, detailed summary of the biggest breaches of 2015.

Share this: