September 13, 2016 CryLocker Tries to Hide Its Loot 2 min read - The CryLocker malware family's novel approach to file management makes it difficult for victims to recover their data, even if they pay a ransom.
September 12, 2016 Things IBM BigFix Can Do for Your Endpoint Security (That You Didn’t Know About) < 1 min read - Respected security leader Jason Cordell offered high praise for IBM BigFix in his ongoing blog series, writing that it "makes ... work very simple."
September 8, 2016 Crypto Keys Conundrum: For InfoSec, Sharing Isn’t Caring 2 min read - SEC Consult found that sharing of nonunique crypto keys is up 40 percent over the last nine months, putting 4.5 million devices at risk.
September 8, 2016 Telnet Ports Subject to Botnets Using Brute-Force 2 min read - Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
September 8, 2016 Point-of-Sale Data Breach Goes to the Cloud 2 min read - During a recent point-of-sale data breach, attackers made off with client data regarding products, sales, passwords and electronic signatures.
September 7, 2016 Antivirus Aggravation: False Positive Detection Delivers Negative Outcome for Windows Users 2 min read - Excessive false positive detection can impair users' ability to perform basic functions or administrative actions, producing results akin to an attack.
September 6, 2016 Study Says the Effect of IT Security Policy Varies Depending on Whom You Ask 2 min read - A new Ponemon study found that IT professionals and end users have different ideas about IT security policy and their organizations' ability to enforce it.
September 6, 2016 Apple Chomps on Critical Zero-Days With Emergency Mac Security Update 2 min read - Apple announced an emergency security update for OS X to address three zero-day flaws that allow cybercriminals to take total control of devices.
September 5, 2016 Mobile Security News Roundup: Top Stories From August 2 min read - August saw many shifts in the mobile security landscape, including several new launches, threats and other snippets providing insight into upcoming trends.
September 1, 2016 BASHLITE Malware Uses IoT for DDoS Attacks 2 min read - The BASHLITE malware family targets IoT devices to create botnets capable of conducting DDoS attacks. One million endpoint devices were affected.