Lancope, Inc., a leader in network visibility and security intelligence, will deliver a complimentary webinar on Thursday, Sept. 26 at 11:00 a.m. U.S. Eastern time entitled, “Hunting Attackers with Network Audit Trails.”
Browsing: Malware and Vulnerabilities
Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
Security researchers have spotted a surge in attacks against online banking customers, thanks to a new strain of Java-exploiting Trojan Caphaw (aka Shylock).
Cloud-based Platform Brings Behavioural Analysis to Mainstream; Delivers Continuous Coverage of Any User on Any Device in Any Location for Pervasive Protection and Real-time Visibility
Seamless Integration Keeps Privileged Passwords Secure During System Scans for Vulnerability Management and Policy Compliance
Beginning in early May, Cisco TRAC has observed a number of malicious redirects that appear to be part of a watering-hole style attack targeting the Energy & Oil sector.
Forget the debate around the security or insecurity of the iPhone 5s’s fingerprint reader. The latest version of the iPhone’s operating system currently offers a gaping hole in its old-fashioned passcode lockscreen.
While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion’s share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses.
NT OBJECTives, Inc., provider of the most automated, comprehensive and accurate web application security software, application security testing services and SaaS, announced today that its NTOSpider On-Demand scanning service
CloudSigma launched its hybrid hosting offering for customers at its cloud locations, including Switch SuperNAP in Las Vegas, Nevada; Interxion in Zurich, Switzerland; and Equinix globally.