April 24, 2017 AIS Stresses Enhancing Your Endpoint Management and Security Strategy < 1 min read - AIS recently published a blog about augmenting your existing endpoint solution with additional capabilities, such as the ones available with IBM BigFix.
April 20, 2017 Vigilante White-Hat Hacker Boosts IoT Device Security 2 min read - Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
April 20, 2017 Files With That? Ransomware-as-a-Service Lets Would-Be Fraudsters Order on Demand 2 min read - Ransomware-as-a-service empowers cybercriminals to order up infections on-demand. Is this the future of digital attacks?
April 20, 2017 Email Tracking Is More Than a Marketing Tool 2 min read - Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
April 19, 2017 Digital Privacy: The Value of Lies? 2 min read - Is digital privacy a right or a privilege? That's the most recent raging debate among consumers, and it could spur a new era of digital misinformation.
April 18, 2017 Punycode Enables Invisible Phishing Attacks 2 min read - Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
April 18, 2017 IBM Guardium Takes the Overall Leadership Position in the First Database Security Leadership Compass by KuppingerCole 3 min read - IBM Security Guardium was named the overall leader out of 10 vendors in the "KuppingerCole Leadership Compass for Database Security."
April 17, 2017 Cerber Ransomware Owns the Market 2 min read - According to recent reports, Cerber ransomware dominated the malware marketplace in the first months of 2017, reducing Locky to irrelevance.
April 17, 2017 Businesses Take a Strategic Turn Toward Encryption 2 min read - More organizations are taking a strategic stance to encryption, and they are deploying a range of technologies and techniques to keep data safe.
April 17, 2017 Magneto Vulnerability: Cybercriminals Drawn to E-commerce Exploit 2 min read - A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.