Fortinet Reveals Top 8 Security Predictions for 2012

Tis the season for many things, like spreading holiday cheer, grabbing swank electronics gear on sale, and watching holiday classics like National Lampoon’s Christmas Vacation and A Christmas Story (funny movies no matter which, if any, holiday you celebrate this time of year). It’s also the season for making lists. Fortinet, a Sunnyvale-based firm specializing…

Trend Micro’s 4 Million Bot Bust

A joint operation between the United States Federal Bureau of Investigation (FBI), authorities in Estonia, and IT security firm Trend Micro recently put down a massive bot network that victimized an estimated 4-5 million users around the globe. Four million is a big number – which makes four million bots, in security terms, a staggering…

Cloud adoption is moving much faster in small businesses than in corporates

Globally the annual mid-market (companies with fewer than 1000 staff) spend for IT hardware, software and services exceeds $250B acording to Andy Monshaw, IBM’s General Manager for Mid-Market.  Andy lives and breathes mid-market, he personally leads as many as 15 end user and IBM partner round tables a month, spending his time listening to customer problems and getting intimately…

Espionage hack attack preys on chemical firms

More than two months after the discovery of an organized malware campaign targeting dozens of companies in the defense and chemical industries, the espionage hack attack shows no signs of letting up. According to a blog post published on Monday, the same group that targeted at least 38 companies between July and September is continuing…

Unsend Emails Sent Using Gmail

Have you ever sent an email and then immediately regretted sending it? If you are using Gmail as your mail client, you can do just that with an interesting but buried option in Gmail settings. To enable this feature, go to Mail Settings in Gmail (upper right corner, under the gear icon). Navigate to the…

More Sykipot Malware Clues Point To China

The Sykipot malware used in recent, targeted attacks against defense contractors appears to have been designed, at least in part, to steal information relating to U.S. military drones and unmanned aerial vehicles. To date, “there have been a lot of different campaigns with different command-and-control servers,” said researchers at Alienvault Labs in a blog post.…