ESET Ireland finds a Trojan downloader disguised as a purchase order email.
Browsing: Malware and Vulnerabilities
Sarah Clarke recommends using “TEA” to build a positive security culture: trust, empowerment, and accountability.
Information security professionals have a unique opportunity to change the security industry forever by collaborating and championing privacy.
Security expert Lori MacVittie explains how education, encouragement, and explanation can help organizations build a positive security culture.
Experts from some of the leading companies in the information security industry comment on the recent iCloud hack.
The main conclusions of the PandaLabs quarterly report for Q2 2014 include the fact that malware is still being created at the record levels.
As businesses gain more experience with the threats associated with BYOD, they’re hard-pressed to find solutions that deal with them.
Birmingham City University hosted Young Rewired State’s (YRS) Festival of Code back in July of 2014, which encourages young coders to hone their skills.
Reports of the CyberVor attack has shocked many readers, but what surprised us was that the number of hacked sites seemed low for an attack of this scale.
Google security researcher Michele Spagnuolo has developed a proof-of-concept tool called Rosetta Flash that reveals security problems with Adobe Flash.