The only proven strategy to thwart CryptoLocker ransomware

Emerging Information Security Threats

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Finjan: Attackers wild about widgets

    In a new report, security firm Finjan says the digital underground will have no trouble finding flaws to exploit in the widgets most Web users take for granted. 

  • Trojan toolkit infected 10,000 Web sites in December

    Finjan's Malicious Code Research Center has uncovered an attack toolkit used to infect Web sites that are typically considered trustworthy. It infected 10,000 sites in December. 

  • Exploit code targets RealPlayer, researchers warn

    A zero-day flaw in the latest version of RealPlayer can be actively targeted with working exploit code, according to researchers at US-CERT. 

  • Storm, Nugache lead dangerous new botnet barrage

    A new breed of malicious software is spreading on the Web. It's engineered to change on the fly, adapt to its environment and evade traditional defenses. 

  • Security Wire Weekly: Security threat landscape

    Computer forensics and accounting fraud investigator Michael Kessler of Kessler International discusses the latest threat landscape and how companies are locking down their sensitive data. 

  • Security Wire Weekly: SANS Top 20

    SANS Top 20 Project Director Rohit Dhamankar talks about this year's SANS Top 20 attack trends report. Also, a summary of this week's news headlines. 

  • Microsoft warns of Windows zero-day

    Attackers could exploit a zero-day flaw in Windows' Web Proxy Auto-Discovery (WPAD) feature to access sensitive data, Microsoft warned Monday. 

  • SANS Top 20 released, but is it still useful?

    The list of top security risks hasn't changed much over the years and some IT security pros question its usefulness. 

  • Solving the RFID Dilemma

    How do you pack enough security--cheaply--into those little chips? 

  • Audio codec flaw imperils multiple applications

    Multiple vendors are affected by a serious Free-Lossless Audio Codec (FLAC) flaw attackers could exploit to hijack targeted systems, US-CERT and eEye Digital Security warned.