Today’s information security teams increasingly rely on security systems with big data capabilities. In order to seek out and detect today’s complex advanced persistent threats you need to monitor network
Browsing: Malware and Vulnerabilities
Businesses and governments in the US, UK, Canada, and India are under assault from a malware-based cybercrime campaign using the Tor anonymizing relay network to hide its authors, say infosec researchers.
GlobalSign recently hosted a webinar discussing how to make access to sensitive data more secure. They surveyed attendees on the topic of multi-factor authentication…
There is a threat circulating on the Internet that I hope you will never experience. It is called CryptoLocker, and it is a form of ransomware – malicious programs that,
To developers, advertising frameworks may just be another way to make money from their free application, but in at least one case–dubbed “Vulna” by security firm FireEye
Security developers have released a stripped-down privacy-friendly browser, Aviator, based on the open source browser core Chromium as used by Google Chrome.
It’s a bad day for the vulnerability scanning industry: DARPA has announced a new multi-million-dollar competition to build a system that will be able to automatically analyze code, find its weak spots, and patch them against attack.
About two weeks ago, it was reported that “Paunch”, the author of the Blackhole Exploit Kit (BHEK), had been arrested by Russian law enforcement. (In addition to his work on BHEK, Paunch is also suspected of working on the Cool Exploit Kit.)
A young security researcher has developed the first ever malware designed to target the recently released Firefox Mobile operating system and plans to unveil the proof-of-concept at the at the upcoming The Ground Zero (G0S) 2013 security summit in November.
Lancope Presents Webinar on Safeguarding patient information and Defending Healthcare Networks with NetFlow