The key to improving a web security program is having a comprehensive metrics program in place – a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road.
Browsing: Malware and Vulnerabilities
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release – attacking dozens of Fortune 1000 firms.
Google has launched Chrome 29. In addition to the functionality improvements, the latest release also includes 25 security fixes.
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate.
A large number of end-user computers are mobile devices and the lion’s share of those are smartphones. APTs are increasingly targeting the mobile market.
Despite it being nearly impossible to avoid news about malware, cyber-espionage and other cybersecurity woes,
A Palestinian information system expert says he was forced to post a bug report on Mark Zuckerberg’s Facebook page after the social network’s security team failed to recognize that a critical vulnerability he found allows anyone to post on someone’s wall.
A paper presented at last week’s USENIX Security Symposium in Washington described how a group of security researchers at Georgia Tech
User-profiling is an interesting approach to countering phishing.
Security tools today have been designed to provide reams of raw data about the security state of corporate applications.