Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
Browsing: Malware and Vulnerabilities
Security researchers have spotted a surge in attacks against online banking customers, thanks to a new strain of Java-exploiting Trojan Caphaw (aka Shylock).
Cloud-based Platform Brings Behavioural Analysis to Mainstream; Delivers Continuous Coverage of Any User on Any Device in Any Location for Pervasive Protection and Real-time Visibility
Seamless Integration Keeps Privileged Passwords Secure During System Scans for Vulnerability Management and Policy Compliance
Beginning in early May, Cisco TRAC has observed a number of malicious redirects that appear to be part of a watering-hole style attack targeting the Energy & Oil sector.
Forget the debate around the security or insecurity of the iPhone 5s’s fingerprint reader. The latest version of the iPhone’s operating system currently offers a gaping hole in its old-fashioned passcode lockscreen.
While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion’s share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses.
NT OBJECTives, Inc., provider of the most automated, comprehensive and accurate web application security software, application security testing services and SaaS, announced today that its NTOSpider On-Demand scanning service
CloudSigma launched its hybrid hosting offering for customers at its cloud locations, including Switch SuperNAP in Las Vegas, Nevada; Interxion in Zurich, Switzerland; and Equinix globally.
It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting