February 9, 2017 Hook, Line and Scammer: New Phishing Attack Favorite Reels In Cloud Storage 2 min read - The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.
February 9, 2017 Mirai Malware Leverages Windows 2 min read - Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.
February 9, 2017 IBM and HCL to Drive Growth and Innovation in Application Security Space 2 min read - IBM and HCL have partnered to build additional application security features and functionalities based on business realities and client priorities.
February 9, 2017 Mind the Gap: Closing Vulnerability Management Exposure With IBM BigFix and QRadar Vulnerability Manager (QVM) < 1 min read - IBM BigFix and QRadar Vulnerability Manager (QVM) can help security professionals close the vulnerability management exposure gap and prevent breaches.
February 7, 2017 Rise in E-Commerce Fraud Requires a Joint Approach From Retailers and Consumers 2 min read - As retailers and financial institutions tighten security around in-store payments, the rate of e-commerce fraud has risen sharply in the past year.
February 7, 2017 XP Lives On as an ATM Operating System in India 2 min read - Windows XP, which hasn't been updated since 2014 and contains many well-known vulnerabilities, is the most common ATM operating system in India.
February 6, 2017 Executives Must Wake Up to the Value of Risk Management Strategy 2 min read - According to the results of a recent Ponemon Institute survey, 76 percent of organizations lack a holistic risk management strategy.
February 6, 2017 Beyond Virtual: Vulnerability Testing Tools Now Hack Hardware 2 min read - A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
February 6, 2017 Infected DRM Files Can Reveal Tor Data 2 min read - Fraudsters with deep pockets have been spreading malware to Tor users through signed DRM files that redirect victims' browsers without warning.
February 6, 2017 Help Support Childhood Cancer Research at RSA 2017 < 1 min read - IT professionals will shave their heads to support childhood cancer research during the second annual St. Baldrick's "Shaves That Save" event at RSA 2017.