Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from…
Browsing: Malware and Vulnerabilities
Zero-Day in Intel Security Solidcore could allow attackers to successfully penetrate banks with customized malware London (UK). Intel Security has…
Following the news that security researchers have discovered a new mobile malware phone Trojan targeting about 2,000 android financial apps,…
Data Will Continue to Be Weaponized in New and Inventive Ways Between the ransomware attacks that plagued the healthcare industry…
Businesses and consumers alike have been affected by the almost daily threats of data breaches and the impact of these…
Bryan Lillie, Chief Technology Officer at QinetiQ explores the current threat of IoT-based cyber-attacks and suggests a novel method that could defend against…
The domino effect Kevin Cunningham, president and founder, SailPoint “2016 has been the year of poor password hygiene, with people continuing…
Reports have emerged that a substation in Pivnichna in the Ukraine, was fully cut off from the main power grid…
Following the news that a widespread “DNSChanger” attack on vulnerable home networking equipment has been redirecting traffic from afflicted networks, including that…
Independent research commissioned by Veracode highlights improvements made in secure development, as well as areas for future improvements in secure…