February 19, 2016 Taking the Bait: Leaked Data Grabs Attackers’ Attention 2 min read - A recent study highlighted how quickly cybercriminals go after leaked data as well as what they do with that information after it's been compromised.
February 18, 2016 Mitigating the Buffer Overflow Flaw in Glibc 3 min read - The GNU C Library (glibc) is vulnerable to a stack-based buffer overflow issue. Learn more about the problem and how to avoid, patch and mitigate it.
February 18, 2016 Locky Ransomware: Cute Name, Ugly Consequences? 2 min read - A new ransomware called Locky is the latest macro malware to attack unsuspecting users in an attempt to encrypt files and extort money.
February 17, 2016 IBM and F5 Announce Partnership to Advance the Mobile Enterprise 2 min read - Businesses searching for a way to securely allow access to mobile enterprise apps can now turn to a new solution that combines EMM and APM technologies.
February 16, 2016 Lockdroid Ransomware Fails Thanks to Google’s Verify Apps 2 min read - At a recent security conference, Google claimed its Verify Apps feature prevented Android users from becoming infected with the Lockdroid ransomware.
February 15, 2016 Cybercrime Doesn’t Pay as Much as Previously Thought, Report Shows 2 min read - A new report from the Ponemon Institute and Palo Alto Networks found that cybercrime isn't as lucrative as it was assumed to be.
February 11, 2016 Danger on the Perimeter! About the Cisco ASA Vulnerability 2 min read - Cisco disclosed a vulnerability alert for their Adaptive Security Appliances (ASAs). The accompanying Cisco ASA alert should be of major concern.
February 11, 2016 Logical Consequences: Siemens Plugs High-Severity PLC Gaps 2 min read - Siemens recently came under fire for high-severity vulnerabilities in some of its PLCs, highlighting a broader problem with IoT.
February 10, 2016 Google Announces Plan to Flag Unsecured Emails 2 min read - Google's Gmail now alerts users when they receive unsecured, unencrypted and unauthenticated emails in an attempt to increase security awareness.
February 10, 2016 APT Groups Roundup: Handling the New Scam Influx 2 min read - APT groups are growing bolder, adding more tools to their arsenals and expanding their target list. Here's what you should know about these major threats.