A look at the top cyber security incidents of 2014 indicates that more robust cyber security responses on the part of businesses and governments are needed.
Browsing: Malware and Vulnerabilities
Experts in the information security industry comment on the recent data breach at Anthem, America’s second largest health insurer.
In order to encourage employees to use a secure file-sharing option, IT teams must implement a solution that’s even easier than a public cloud service.
Two security experts comment on the recent news that a new CTB Locker ransomware variant is targeting users’ data.
Jack Marsal of ForeScout Technologies discusses how network access control (NAC) can help companies better protect against breaches and other attacks.
Richard Moulds of Thales e-Security comments on an important partnership between Gem and Thales to bring HSM security to Bitcoin transactions and wallets.
According to Kaspersky Lab, the number of untrusted digital certificates used to sign malicious software doubled in the last year.
AVG spoke with more than 1500 small businesses and asked them what they thought of the Internet of Things in respect of their readiness and plans to invest.
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).