My last blog argued that the technical reliance on anti-malware must end if we are to meet the challenges of contemporary cyber threats to both consumers and enterprises.
Browsing: Malware and Vulnerabilities
The phrase “threat landscape” is a cliche of information security discussions but like many cliches it still means something. In our case it usefully describes the actual type and level of threats that businesses face on a daily basis.
As per title says, the answer is VERY bad and nasty.
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, man-in-the-browser and brute force attacks.
Mac users like to lord it over their Windows-using counterparts about the supposed superiority of their cat-themed operating system when it comes to malware and Web-based attacks.
Google Glass was silently patched by the internet giant last month after a flaw was discovered that could have allowed hackers to capture user data sent from the device, mobile security firm Lookout has revealed.
A proof-of-concept exploit for the “master key” vulnerability in Android has already been made public, so it could be only a matter of time until we see some Trojanized apps that leverage the flaw.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
Revelations of US spooks monitoring the internet have freaked out consumers so much that privacy protection software will be The Next Big Thing.
Nearly half of the companies that participated in the ‘IDC market analysis perspective: a worldwise security products survey’ conducted by IDC in December 2012, believe that increasingly sophisticated attacks pose a serious threat to their IT infrastructures.