In order to make sure a phishing campaign works, the victim has to believe an email is legitimate. It’s no surprise that the Apple security breach is the latest event to be taken advantage of.
Browsing: Malware and Vulnerabilities
According to Kaspersky Lab’s second quarter report, Kaspersky Security Bulletin, for April to June 2013, 19.9 million malware threats were detected on the computers of the Kaspersky Security Network (KSN) participants in India.
A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection.
More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an attack is underway, according to ThreatTrack Security.
Cisco Systems is beefing up its security portfolio to better address advanced persistent threats with the $2.7 billion acquisition of Sourcefire – a move that at least one analyst thinks could kick off a wave of consolidation in the cybersecurity space.
The US Food and Drug Administration (FDA), following increased concerns regarding the security of medical devices, is in the midst of developing a cybersecurity laboratory, it announced this weekend.
Imperva (NYSE: IMPV), a pioneer and a leader of a new category of business security solutions for critical applications and high-value data in the data center,
Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Check. The Black Hat conference convening in Las Vegas next week offers hacker tools for all of those plus more.
When Kate Middleton, the Duchess of Cambridge, went into labor with the child who recently became third in line for the throne of England, the event immediately had millions of royal-watchers riveted
Local newspapers one day ago joyfully reported that the server which commanded and controlled the hacking to online newspapers was found and neutralized. However, the disaster has not ended yet.