Standard cloud migration models are insufficient when moving mission critical workloads
Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …
Criminal hacking: Top technology risk to health, safety and prosperity
Americans believe criminal hacking into computer systems is now a top risk to their health, safety and prosperity. Criminal hacking, a new ESET survey finds, outranks other …
Week in review: CCleaner compromise, Optionsbleed, and Linux devices sending out spam
Here’s an overview of some of last week’s most interesting news and articles: Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco There is a new …
Enterprise cloud adoption and IaaS security
Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service …
Is your router sending out spam?
A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor …
Spoofed IRS notice delivers RAT through link updating trick
The malware delivery trick involving updating links in Word documents is apparently gaining some traction: the latest campaign to use it likely takes the form of fake emails …
New infosec products of the week: September 22, 2017
Cyber-defense for critical infrastructure including factories, plants, utilities & hospitals NTT Security has launched IT/OT Integrated Security Services, delivered via a …
46,000 new phishing sites are created every day
An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s …
Equifax directed consumers to fake phishing site for weeks
You can now add another blunder to the already long list of Equifax’s missteps in the wake of the massive breach it announced earlier this month: the company has been …
Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco
There is a new twist in the CCleaner hack saga: the attackers apparently didn’t set out to compromise as many machines as possible, but were after some very specific …
Three things to know about the dark web
One of the more curious aspects about the dark web is that it didn’t start out as such a dark place: it began with bulletin boards in the 80s and 90s – the markets of …
Legacy networks holding back cloud and digital transformation
A new global survey by Riverbed Technology, which includes responses from 1,000 IT decision makers across nine countries, revealed an incredible level of agreement that legacy …