NEWS & ANALYSIS
May 11, 2009 -Heartland Payments Systems has announced that it will offer end-to-end encryption to its merchants for their payment card processing after last year's hack attack that may have compromised more than 100 million card accounts.
Apr 29, 2009 -Phishers and spammers are exploiting worldwide fear of swine flu to sell pharmaceutical products and steal personal information from anxious e-mail users, the U.S. Computer Emergency Readiness Team reports.
Mar 30, 2009 -Cybercrime is again on the rise, and the United States boasts both the most cybercriminals and victims, according to a British paper.
Mar 23, 2009 -Cybercriminals have copied the popular techniques of search engine optimization (SEO) to engineer a scheme that can rake in as much as $10,800 a day, according to Finjan's Malicious Code Research Center.
Mar 16, 2009 -Cybercriminals are exploiting the worst economic downturn since the Great Depression to find new ways to steal people's identities, writes Ray Dickenson of E-Commerce Times.
Mar 13, 2009 -The militarization of cyberspace is fast afoot as states or their proxies begin to launch distributed denial of service (DDoS) attacks against critics and adversaries, a security researcher said at an IT security trade show in Boston.
Mar 04, 2009 -A worm preying on Facebook accounts in December is back with a vengeance, PCWorld.com reports. But this time, it's burrowing into other social networking Web sites, including Myspace, Friendster, LiveJournal and others.
Feb 24, 2009 -When pitted between convenience or security concerning passwords, most consumers will choose what's easy rather than what's safe, according to a recent survey from Gartner.
Feb 12, 2009 -Hackers that visit a Romanian Web site, Hackersblog, have claimed the third straight breach of a security vendor's Web site using SQL injection in a week.
Feb 06, 2009 -A phishing scam involving fake parking tickets and a fake Web site uncovered in Grand Forks, North Dakota, could be the future of malicious activity on the Internet, says an IT security specialist.