May 22, 2018
Via: CSOA big problem in the computer security world is that practitioners aren’t skeptical enough, don’t question purported authority statements, and often don’t ask the right questions. It’s a theme I see over and over, and it leads defenders to enacting […]
May 11, 2018
Via: CSOEndpoint security is in many ways the direct descendent of the first forms of computer protection in the earliest days of IT. But it’s a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones […]
April 18, 2018
Via: CSOCyptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year, according to Comodo Cybersecurity Threat Research Labs’ Q1 Global Malware Report.In the first three months of 2018, Comodo said it “detected 28.9 million cryptominer incidents out […]
April 5, 2018
Via: CSOUnderstanding hackers and how they attack Whatever the threat, it is arriving to your computer in one of two ways: human adversary or malware. Human attackers can use any of the hundreds of thousands of known computer exploits and attack […]
February 26, 2018
Via: CSOHikers living off the land make use of existing nutrients and water sources to survive in the wilderness. In hacker parlance, the term “survive in the wilderness” means they cover their tracks and make use of tools and code that […]
July 5, 2017
Via: Networkworld SecurityNetwork traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain […]
June 1, 2017
Via: Networkworld SecurityThe WannaCry outbreak has been troubling in many regards – exposing flaws, and opening doors to much finger-pointing and blaming that have gone well beyond the handling and disclosure of nation-state cyber weapon stockpiling. The attackers likely had a good […]
May 19, 2017
Via: Networkworld SecurityThere has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless. Gizmodo flat out said that you really don’t need an antivirus […]
May 5, 2017
Via: Networkworld SecurityA sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS. The group, known in the security industry as Snake, Turla or Uroburos, has been active since at least 2007 […]
May 1, 2017
Via: CSOA new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information. The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users […]
March 13, 2017
Via: CSOIs your computer running slower than usual? Are you getting lots of pop-ups? Have you seen other weird problems crop up? If so, your PC might be infected with a virus, spyware, or other malware—even if you have an antivirus […]
February 21, 2017
Via: CSOMobile malware traces its roots back to a mobile virus called Timofonica in 2000. Today there are robust examples like Ghost Push which was discovered late in 2015. Ghost Push is a type of malware for Android devices that gains […]
December 16, 2016
Via: Networkworld SecurityAs little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped. “When you look at mergers where one big company buys another big company, I’d estimate that the […]
October 3, 2016
Via: CSOThis was interesting in so many ways, this week McAfee issued a report showing how malware delivery using compromised websites and gaming Google search analytics has suddenly become a lot smarter. What these criminals are doing is they are watching […]
September 16, 2016
Via: Cisco BlogMalware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, […]
September 14, 2016
Via: CSORansomware, where a hacker commandeers a user’s computer files and threatens to permanently delete them unless an extortion payment is made, is on a sharp uptick and now ranks “among the most troubling cyberthreats,” the head of the Federal Trade […]
September 7, 2016
Via: Networkworld SecurityThe Federal Bureau of Investigation’s disclosure earlier this month that foreign hackers had infiltrated voter registration systems in Illinois and Arizona came as no surprise to some cybersecurity experts. “Given where cybercrime has gone, it’s not too surprising to think […]
August 2, 2016
Via: CSOThe short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam. The long answer is more complex, but security vendor Trustwave offered some insights in its 2016 Trustwave Global Security […]
July 1, 2016
Via: CSOLizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised Internet-of-Things devices. LizardStresser has two components: A client […]
June 29, 2016
Via: CSOHackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play. The malware, which has struck Android users in Denmark, Italy and Germany, has been spreading through a phishing […]