Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
Survey highlights ignorant IT behavior in the workplace
You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …
Unofficial Android iMessage app can steal info and download malware
Android users who have dreamed about being able to use iMessage, Apple’s proprietary and free messaging solution, have been pleasantly surprised by the iMessage Chat for …
Major increase in Filecoder malware
The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware – Trojans that encrypt user files and try to extort a ransom from the …
Concerns around insider threats escalate
Vormetric announced the results of its “Insider Threat” survey, which surveyed more than 700 IT decision-makers. The study of mid-market and enterprise …
Rootkit detector for OS X
ESET Rootkit Detector is a new security tool for OS X that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the OS. When …
Widespread disregard for corporate cloud policies
While most business professionals are worried about the security of cloud-based applications, they are not deterred from using them to store their personal and professional …
Researcher despairs of critical SIM flaws being fixed before attacks happen
Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …
Cisco enhances safety and security solutions
Cisco announced enhancements to its portfolio of safety and security solutions with video surveillance architectures and new Internet of Things (IoT) enabled solutions that …
A short overview of Android banking malware
As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …
IE 0-day attack reports push ISC to raise official threat level
Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …
Federal cyber security pros lack confidence in FISMA
A report by MeriTalk and NetApp examines the state of cyber security at Federal agencies and looks at whether the Federal Information Security Management Act (FISMA) is …