March 1, 2016 FighterPOS Malware Gets a Worm Variant 2 min read - A security firm recently flagged new versions of the malware FighterPOS, including a worm variant, that may affect U.S. point-of-sale (POS) networks.
February 29, 2016 Secure Connections? Virtually All SSL VPN Servers Miss the Mark 2 min read - A recent study from High-Tech Bridge indicated that the vast majority of SSL VPN servers are unsecured, and many are years behind the industry.
February 29, 2016 UK Cybercrime on the Rise as Security Confidence Lags 2 min read - Cybercrime in the U.K. continues to grow, but most organizations are not confident in their ability to defend against these threats.
February 25, 2016 Drupal 6 Hits the End-of-Life Milestone 2 min read - Drupal 6 hit its end-of-life mark, meaning the service is now unsupported. Users may be vulnerable to exploits by cybercriminals.
February 25, 2016 Collaborative Defense: Accelerating Threat Protection With Partnerships 3 min read - IBM Security and Check Point worked together to create a collaborative defense with superior threat intelligence and mobile threat management.
February 24, 2016 Mandatory Windows 10 Update Reverts to Default Settings, Causing User Frustration 2 min read - Windows 10 forces an upgrade that destroys default settings on many files without allowing them to be reset, causing major security issues for users.
February 24, 2016 Innovative Cybersecurity Startups Boosted by New, Big-League Investment Group 2 min read - A new company, Strategic Cyber Ventures, hopes to bolster cybersecurity startups with the funding and resources they need to innovate and succeed.
February 23, 2016 Embracing Intelligence-Driven Fraud Protection and Life Cycle Management 2 min read - The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud prevention so organizations can remain secure at low cost.
February 23, 2016 Announcing the Launch of the AppConfig Community 3 min read - Leading EMM providers IBM, MobileIron, JAMF Software and VMware have come together, working on a common approach for mobile app config and security.
February 22, 2016 Researchers Find VoIP Phones Vulnerable to Simple Cyberattacks 2 min read - Security researchers recently discovered a possible vulnerability in voice-over-IP (VoIP) phones that could put users at risk.