June 30, 2016 Added by:Ionut Arghire
A new spyware Trojan aimed at Russian users exclusively was recently observed targeting various accounting applications, as well as instant messaging, email, and Microsoft Office programs, in an attempt to exfiltrate sensitive data.
June 28, 2016 Added by:Nick Bilogorskiy
In the age of stolen passwords, compromised credentials are the easiest way in, simpler than phishing, malware or exploits. “Password confirmation” tools are now readily available to find reused passwords matching any website.
June 20, 2016 Added by:Steve Durbin
Executives are familiar with the benefits of cyberspace and how the Internet, and today’s usage of connected devices, increases innovation, collaboration, efficiency, competitiveness and commitment to customers, but many struggle with assessing the risks versus the rewards.
Don't Let the Cure Become the Disease: Granular Control Is the Only Answer to Security Woes Caused By Encryption
June 20, 2016 Added by:Peter Martini
With the proper controls in place, organizations don’t have to fear encryption. Hackers can only succeed in exploiting encryption when organizations lack the right tools to fight back.
June 15, 2016 Added by:Ajit Sancheti
Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.
June 13, 2016 Added by:Dan Lohrmann
Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.
June 13, 2016 Added by:Ionut Arghire
The Android N operating system version will no longer use the Crypto provider and the SHA1PRNG algorithm, Google announced.
June 06, 2016 Added by:Ionut Arghire
Dubbed BadBlock, a new ransomware doesn’t stop at encrypting the user’s photos, videos, and images, but does the same for Windows system files as well, which ultimately results in the computer being no longer usable.
June 03, 2016 Added by:Ajit Sancheti
Embracing new technologies that help intelligently automate parts of security to provide overwhelmed security teams a hand is a start. But in the long run, bigger changes to security strategies will need to take place. Everyone in a company needs to be responsible for security, not just the CISO.
May 30, 2016 Added by:Ionut Arghire
Dubbed BackDoor.TeamViewer.49, the new Trojan was discovered by Dr. Web and Yandex earlier this month being distributed via a fake Flash Player update. The bogus update package, however, turns out to be a different malicious application called Trojan.MulDrop6.39120, which acts as a dropper, Dr. Web researchers say.
May 26, 2016 Added by:InfosecIsland News
SecurityWeek’s 2016 CISO Forum will take place on June 1-2, 2016 at the Ritz Carlton, Half Moon Bay.
May 24, 2016 Added by:Brian Soldato
User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.
May 22, 2016 Added by:InfosecIsland News
A long-lasting website infection campaign meant to redirect users to exploit kits (EKs) such as Angler and Neutrino continues to run strong roughly one year and a half after being originally discovered.
May 16, 2016 Added by:Steven Rogers
It is never too late to remind employees about phishing emails and where to route suspicious finds.
May 10, 2016 Added by:Peter Zavlaris
To some, the Tor network is believed to be a haven for threat actors, as well as a platform for launching web based attacks.
May 10, 2016 Added by:Ionut Arghire
Malvertising, the malicious activity that involves spreading malware via online advertising, has been trending up over the past few years, and 2016 might become a record-breaking year for it, Cyphort Labs researchers suggest.