Cost of Advanced Evasion Techniques in recent data breaches
A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats …
Simple steps to prevent data theft
HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …
Week in review: Banks sue Target and Trustwave, Basecamp DDoS, Fyodor restarts the Full Disclosure list
Here’s an overview of some of last week’s most interesting news, reviews and articles: Flaws in Android update mechanism could turn apps into malware A group of …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
WordPress sites hijacked via “free” premium plugins
If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …
Uncommon new worm targets Word and Excel files
Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …
Having a backup solution doesn’t prevent data loss
Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …
Challenges of running cloud-hosted applications
CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …
Analysis of three billion attacks reveals SQL injections cost $196,000
NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …
Does business understand IT security?
The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …
Cisco expands wireless LAN portfolio
Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …
Zorenium bot can now hit iOS users as well
If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends