November 17, 2015 Buy-Buy Security? New POS Malware Looks to Cash In 2 min read - Several types of point-of-sale malware are gaining steam ahead of the holiday season, getting ready to target shoppers and their personal information.
November 13, 2015 Cherry Picker Malware Leaves Without a Trace After Attacking POS Systems 2 min read - A new POS malware known as Cherry Picker has shown the ability to erase itself from a machine, making it incredibly difficult to detect.
November 12, 2015 UK Spy Agency Partners With Industry and Academia on Cybersecurity Research Program 2 min read - The U.K. government, the spy agency GCHQ and various academic and business partners are pulling together for a cybersecurity research program.
November 12, 2015 The Insider Threat: Government’s Real Cyber Worry? 2 min read - Government agencies are understandably worried about external cyberthreats, but is the insider threat their biggest problem?
November 12, 2015 Pride and Privileges: IT Professionals Struggle With Credential Compromise 3 min read - IT professionals are tasked with managing the varying levels of access employees have to corporate data, which is a tall task for any security pro.
November 12, 2015 TalkTalk Hack Could Have a $53 Million Price Tag, Even if Few Customers Are Affected 2 min read - The latest TalkTalk hack could come with a hefty price tag for the Internet service provider — and major security implications for victims.
November 11, 2015 Friday Is Peak Malware Distribution Day, Study Shows 3 min read - Malware distribution tends to peak on Friday, according to a new study from Cyren. Here's what else the report had to say about cyberthreats.
November 10, 2015 SAP Vulnerabilities Shaking HANA’s Tree, Could Lead to Data Breach 2 min read - A new set of SAP HANA vulnerabilities could put corporate data at risk of severe, remote attacks and possible data breach if left unpatched.
November 10, 2015 Send in the Devs? Data Breach Prep Demands Team Effort 2 min read - Application developers need to be involved with boardroom executives from the start if companies hope to effectively avoid a data breach.
November 6, 2015 University Researchers Show How Widely Mobile Apps Share Users’ Personal Information 2 min read - Harvard, MIT and Carnegie Mellon teamed up to show just how much of users' personal information is shared by smartphone applications.