endpoint security
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110650/danger-400x200.jpg)
EyePyramid clears the way for future malware attacks
Several weeks ago, the release of court documents revealed a long-standing cyber espionage campaign aimed at Italian politicians and businesspeople, law firms, state …
![attack](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111903/attack-400x200.jpg)
McAfee Virus Scan Enterprise opens Linux machines to remote attackers
Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …
![PoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105605/pos-400x200.jpg)
PoS attacks: Undetected vulnerabilities lay in wait
Attivo Networks issued a report detailing severe vulnerabilities in the nation’s POS systems that could lead to large breaches during the Holiday shopping period and on into …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105929/arrow-400x200.jpg)
Retailers overconfident in endpoint security
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112051/tools-400x200.jpg)
Microsoft extends support for EMET, but its days are numbered
The days of EMET, Microsoft’s Enhanced Mitigation Experience Toolkit for Windows, are numbered. Although, the company has listened to the customers’ pleas, and is …
![Windows 7](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09110012/windows7-400x200.jpg)
65% of Windows devices still running Windows 7, released in 2009
To analyze the current state of device security, Duo Security analyzed more than two million devices, 63 percent of which were running Microsoft operating systems. Seriously …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111208/stop-sign-400x200.jpg)
MBRFilter: Cisco open sources tool to protect the Master Boot Record
Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …
![NetSess](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110212/NetSess-400x200.jpg)
Net Cease: Microsoft researchers unveil anti-reconnaissance tool
Microsoft researchers Itai Grady and Tal Be’ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194817/email-1-400x200.jpg)
WSF attachments are the latest malware delivery vehicle
Most users have by now learned not to open executable (.EXE), various MS Office, RTF and PDF files delivered via unsolicited emails, but malware peddlers are always trying out …
![team](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111650/team-400x200.jpg)
Does your organization have an endpoint security strategy?
Only thirty-three percent of IT security professionals have security strategies in place to protect the growing number of endpoints on their networks, according to a recent …
![osquery](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110448/osquery-400x200.jpg)
OS analysis tool osquery finally available for Windows
Nearly two years after Facebook open sourced osquery, the social networking giant has made available an osquery developer kit for Windows, allowing security teams to build …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195228/market-400x200.jpg)
Spam is once again on the rise
Spam volume is back to mid-2010 heights, and Cisco Talos researchers say that the Necurs botnet is partly to blame. “Many of the host IPs sending Necurs’ spam have …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)