Please turn on your JavaScript for this page to function normally.
NSS Labs unveils Threat Modeling and Threat Forecasting

NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …

Automated remediation for APTs and 0-days

ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …

Chrome, Firefox users targeted with account-hijacking plugins

Hijacked social networking accounts can be monetized in a number of ways, so cyber crooks are always thinking up new ways of doing so, preferably without the user noticing. …

Norman Shark updates Malware Analyzer G2

Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …

Record malware growth in China, Ukraine and Saudi Arabia

51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …

TOR-based botnets on the rise

Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …

Malicious apps exploiting Android “Master Key” bug found

Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …

A historical overview of the cyberattack landscape

Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …

The rise of sophisticated malware

A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …

Executives lack confidence in their cyber security

More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an …

Bogus “Royal Baby: Live Updates” email leads to malware

As expected, news of the new birth in the British Royal Family has become a perfect lure in malware delivery schemes. ThreatTrack has spotted an email titled “The Royal …

HTML ransomware goes global

Last week we saw that a ransomware scheme does not need to involve actual malware, as clever cyber crooks leveraged browsers’ “restore from crash” feature to …

Don't miss

Cybersecurity news