Please turn on your JavaScript for this page to function normally.
trojan
Dok Mac malware intercepts victims’ web traffic, installs backdoor

A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …

mobile device
Data security and mobile devices: How to make it work

There has been a lot of hype in the media about messaging tools. But recently, some of the headlines have taken a negative turn. Just last month, we read how a London-based …

world
200 million financial services records breached in 2016, 900% increase from 2015

The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …

Windows 10
Windows 10 adoption is accelerating, many concerns remain

The vast majority of IT organizations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption, according to a new …

general virtual digital
Week in review: Lure10 attack, DoublePulsar exploit proliferation

Here’s an overview of some of last week’s most interesting news and articles: BrickerBot bricked 2 million IoT devices, its author claims The author of BrickerBot, …

World target
IT service providers, many other orgs targeted in long-standing attack campaign

US-CERT has released an alert warning about a sophisticated attack campaign using multiple malware implants and targeting organizations in the IT, Energy, Healthcare and …

Will fileless malware push the antivirus industry into oblivion?

The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …

smart hospitals, healthcare
How to securely deploy medical devices within a healthcare facility

The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …

talk speak speaker
Industry reactions to the Verizon 2017 Data Breach Investigations Report

Nearly 2,000 breaches were analyzed in this year’s Verizon 2017 Data Breach Investigations Report and more than 300 were espionage-related. Here are some of the comments Help …

Samsung
Employees increasingly allowed to move data onto personal mobile devices

Corporate data governance programs are difficult to establish and enforce. For the most part, these programs lack the necessary people, processes and technology to effectively …

New infosec products of the week​: April 28, 2017

Cyberbit EDR uses adaptive behavioral analysis to detect fileless, signature-less attacks Cyberbit announced a new version of its adaptive Endpoint Detection and Response …

people
IT teams struggle with digital transformation skills

New research conducted by Vanson Bourne aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future …

Don't miss

Cybersecurity news