The US Food and Drug Administration (FDA), following increased concerns regarding the security of medical devices, is in the midst of developing a cybersecurity laboratory, it announced this weekend.
Browsing: Malware and Vulnerabilities
Imperva (NYSE: IMPV), a pioneer and a leader of a new category of business security solutions for critical applications and high-value data in the data center,
Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Check. The Black Hat conference convening in Las Vegas next week offers hacker tools for all of those plus more.
When Kate Middleton, the Duchess of Cambridge, went into labor with the child who recently became third in line for the throne of England, the event immediately had millions of royal-watchers riveted
Local newspapers one day ago joyfully reported that the server which commanded and controlled the hacking to online newspapers was found and neutralized. However, the disaster has not ended yet.
My last blog argued that the technical reliance on anti-malware must end if we are to meet the challenges of contemporary cyber threats to both consumers and enterprises.
The phrase “threat landscape” is a cliche of information security discussions but like many cliches it still means something. In our case it usefully describes the actual type and level of threats that businesses face on a daily basis.
As per title says, the answer is VERY bad and nasty.
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, man-in-the-browser and brute force attacks.
Mac users like to lord it over their Windows-using counterparts about the supposed superiority of their cat-themed operating system when it comes to malware and Web-based attacks.