Emerging Information Security Threats
- May 20, 2015
A newly discovered TLS vulnerability that affects thousands of websites, servers and browser users could allow attackers to bypass encryption.
- May 04, 2015
Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.
- April 24, 2015
Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect.
- April 22, 2015
Huawei's U.S. CSO pitched the rigor of its supply chain security processes to RSA Conference 2015 attendees, but they remained skeptical at best on whether to trust the Chinese networking and security vendor.
- April 22, 2015
IoT discovery and federation controls are lacking. Benjamin Jun says the answer is to build better IoT federation and trust protocols.
- April 08, 2015
Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.
- April 03, 2015
News roundup: President Obama's executive order allowing sanctions on cyberattackers has been met with mixed reaction. Plus: Threat intelligence perception versus reality; healthcare breach consequences; Verizon tosses supercookie.
- April 01, 2015
As attackers move beyond “spray and pray” tactics to advanced persistent threats -- having better security than your competitors is no longer enough. Targeted attacks today are often for financial gain through extortion and threats to expose or ...
- March 27, 2015
As more data moves online, social engineering techniques are becoming increasingly advanced and traditional training methods may not be enough to keep enterprises safe.
- March 13, 2015
News roundup: Hillary Clinton's decision to use a private email domain and server has created a firestorm over her email security mistakes. Plus: OpenSSL audit, Blue Coat acquisition, more Equation details emerge.