By 2020, securing enterprise IT will require a shift to information and people-centric security strategies focused on an infrastructure’s end-points.
Browsing: Malware and Vulnerabilities
The survey evaluated the responses of 102 financial services organisations and 151 retail organisations in the U.K., all of which process card payments.
Malware called Gameover, Zeus, GOZeus, or P2PZeus has been created by Cyber Criminals and is in active circulation as of June 2014
ESET experts have caught the first example of an Android mobile Trojan, which they named Android/Simplocker.
Panda GateDefender eSeries includes robust, next-generation VPN technologies that enable fast and highly scalable VPN connections
You can see the manual analysis I did on a fresh sample unrelated to Gameover that arrived in my home email on June 1st.
OWASP has announced 4 world-renowned keynote speakers for AppSec Europe 2014 that takes place at Anglia Ruskin University in Cambridge, UK from 23-26 June
What if Mother Nature was the CISO? What strategy could she give the prey species so they could survive in the presence of many predators?
Remediating Heartbleed is a daunting task, but the good news is that use of orchestration tools, popular with DevOps, can make remediating this bug a lot easier.
The main conclusions of the study include the fact that malware creation has broken all records during this period, with a figure of more than 15 million