April 11, 2018
Via: Dark ReadingBusinesses say their current security tools aren’t effective in the cloud but hesitate to adopt cloud-based security systems. Cloud usage is growing faster than businesses’ ability to secure it. While IT pros are quick to point out the benefits of […]
April 5, 2018
Via: The HillMore than half of the email domains managed by the White House’s Executive Office of the President (EOP) have not yet implemented an email security tool designed to protect users from phishing attacks, according to new research. The Department of […]
Application security, Cloud security
April 5, 2018
Via: Security WeekAmazon Web Services (AWS) announced on Wednesday the launch of several tools and services designed to help customers manage their firewalls, use private certificates, and safely store credentials. Private Certificate Authority One of the new services is called Private Certificate […]
February 27, 2018
Via: CSO OnlineThe following are the 12 best antivirus tools for Android, according to AV-TEST’s January 2018 evaluations of 20 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.) Each Android antivirus software […]
February 21, 2018
Via: Dark ReadingAdvanced nation-state and cybercrime groups increasingly are hiding behind legitimate Microsoft Windows functions to mask their hacks – and their latest method ups the ante in abuses of the basic command prompt. The FIN7, aka Carbanak, cybercrime gang known for […]
February 5, 2018
Via: CSO OnlineWith the rise in both the volume and variety of cyber threats, it seems there are now specialized tools for almost everything. This was never more obvious than at the latest RSA Conference, where there were more than 800 exhibitors […]
Privacy protection, Virus & Malware
January 10, 2018
Via: Security WeekYour antivirus product could be spying on you without you having a clue. It might be intentional but legitimate behavior, yet (malicious) intent is the one step separating antivirus software from a cyber-espionage tool. A perfect one, experts argue. Because […]
November 17, 2017
Via: Security WeekThe Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool, Bitdefender says in a new report. Highly customized and sophisticated, Terdot is based on the source code of ZeuS, which leaked online in 2011. […]
Mobile security, Vulnerabilities
November 15, 2017
Via: Threat PostChinese phone maker OnePlus is accused of leaving a debugging app on its phones capable of giving adversaries root access to the devices. The application in question is called EngineerMode and is made by Qualcomm. An anonymous researcher who goes […]
November 7, 2017
Via: Dark ReadingA recent study finds 74% of millennials and post-millennials agree VR use in cybersecurity tools may entice them into an IT security career. Cybersecurity tools that employ immersive technologies such as virtual reality and augmented reality could attract millennials and […]
August 29, 2017
Via: Security IntelligenceThe continuous advancement and sophistication of cyberthreats has gradually decreased the sufficiency of traditional gateway and endpoint security solutions for protection against malware. These approaches were sufficient when malware occurred in small numbers and it was easy to differentiate between […]
December 22, 2016
Via: Security AffairsGoogle presented the Project Wycheproof, an open source Crypto Library Testing Tool that was launched to allow development teams to discover security vulnerabilities in popular cryptographic software libraries. “Project Wycheproof tests crypto libraries against known attacks. It is developed and maintained by members […]
August 2, 2016
Via: Security WeekBarclays Bank announced on Monday that it will commence rolling out voice security authentication to all customers, replacing the existing password-based method. A Barclays spokesperson told SecurityWeek this will make its “telephone banking service easier to use and more secure […]
June 9, 2016
Via: Kaspersky BlogIn case you didn’t know, cyber-criminals often take advantage of bugs (exploitable flaws in software) to get inside their victims’ PCs. That’s why every Internet user should install patches and security updates for their systems and software as soon as […]
September 28, 2015
Via: cloud-securityOne of #cloudflare’s customers was recently hit by a distributed denial-of-service (DDoS) attack that appeared to leverage a mobile ad network and malicious JavaScript. JavaScript-based DDoS attacks have been classified as Layer 7 attacks because they rely on apparently legitimate […]
September 3, 2015
Via: network-securitySince Monday, security pros can add another XSS-finding tool to their arsenal, as Netflix has open sourced their cross-site scripting payload management framework dubbed “Sleepy Puppy.” Sleepy Puppy is meant to address the biggest problem with identifying omnipresent XSS issues: […]
April 30, 2024
April 11, 2024
April 30, 2024