May 16, 2016 Collaboration Key to Driving Security Innovation in Energy and Utilities Sector 2 min read - IBM and Samsung have entered a partnership that will prioritize driving security innovation throughout the energy and utilities industry.
May 12, 2016 DARPA Aims for More Cyberthreat Attribution 2 min read - DARPA is looking to fund better methods for attributing the origin of a cyberattack, which should zero in on actors and improve defenses.
May 12, 2016 POS Threats: Big Trouble From Tiny Tag Team 2 min read - The news that two separate POS threats may be teaming up to steal personal and financial data should serve as a major warning to businesses.
May 12, 2016 Patch Tuesday Is Critical for Windows Users 2 min read - Users should pay particular attention to recent Patch Tuesday updates, which will fix several critical vulnerabilities in Windows products.
May 10, 2016 Dumbed Down: Locky Ransomware Hacked by White Hats 2 min read - A white-hat hacker managed to take some bite out of the malicious Locky ransomware. Are other advanced threats the next target?
May 10, 2016 Dozens of Security Flaws Found in Aruba Networks Products 2 min read - Aruba Networks recently admitted to security flaws in its PAPI wireless network protocol — after a security researcher identified the issues.
May 9, 2016 WordPress Hack Redirects Users Randomly 2 min read - Sucuri recently discovered a new WordPress hack that redirects users to malicious domains. Luckily, there are relatively easy ways to discover infections.
May 9, 2016 Friendly Warning: PoC Exploits Dial In on Social Media Channels 2 min read - Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
May 9, 2016 Spanish-Language Infostealer Trojan Uses Legitimate Libraries 2 min read - A Spanish-speaking infostealer Trojan leverages legitimate software and code for nefarious purposes, according to new findings.
May 5, 2016 Designer Malware Campaigns: The Rise of Couture Cybercrime? 2 min read - Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.