Tag : phishing


Cryptolocker – Nasty Ransomware Wrecking Havoc Worldwide

Jan 13, 2014 By Sharon Solomon | If you own a PC running Windows, you are vulnerable to Cryptolocker. This Trojan entered the spotlight in late 2013 and is not showing any signs of slowing down. It’s very important to understand and be aware of this fast-spreading ransomware, which has already earned its operators lots of money. The dreaded Trojan initially spread only via emails. Users were sent malicious emails with downloadable files or misleading links. The exploited computer’s data files were then locked until a ransom was paid for the decryption. The news keeps getting worse. Cryptolocker is now capable of contaminating computers with removable USB drives and pirate software activators. Windows users should refrain from using unknown USB drives and must install only official software.

</Read More>

Top-10 Essential Challenges of Mobile Security

Nov 29, 2013 By Sharon Solomon | Mobile Security has become a crucial aspect of protecting sensitive data and information. Malicious attacks once focused on PC’s have now shifted to mobile phones and applications. Mobile makers are aware of this fact and are investing heavily in security.

</Read More>

3 Most Common Phishing Scams

May 03, 2012 By Administrator | A recent report by the Securities and Exchange Commission (www.sec.gov), indicates that phishing is on the rise. In fact, phishing is the kind of cybercrime an average user is most likely to encounter on a day-to-day basis. Phishing attacks rely on human vulnerabilities, making them more difficult to defend against when compared to viruses, for example. Although modern browsers and security suites incorporate anti-phishing technologies, it still pays to be aware of the most common phishing scams.

</Read More>

Whats HOT in Application Security Vol #9

Apr 24, 2012 By Administrator | Lady Gaga keeps her poker face in light of SQL Injection!
Lady Gaga’s website had a ‘Bad Romance’ with an SQL Injection attack, revealing the personal details of thousands of fans! The hack was reported more than six months ago and was committed by a group of hackers going under the pseudoname ‘SwagSec’. Even though the hackers never actually published the personal information of the fans, it is a major embarrassment for Lady Gaga’s team.

</Read More>

Top 5 Cyber Threats to Businesses

Mar 28, 2012 By Administrator | According to FBI Director Robert Mueller, cyber-crime is on track to
surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.