3.1 C
London
Sunday, November 19, 2017

121 Pieces of Malware Flagged on NSA Employee’s Home Computer

Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.

Optiv Acquires Decision Lab to Expand Big Data Services

Deal enhances Optiv's big data, automation, and orchestration efforts.

Forget APTs: Let’s Talk about Advanced Persistent Infrastructure

Understanding how bad guys reuse infrastructure will show you the areas of your network to target when investigating new threats and reiteration of old malware.

Death of the Tier 1 SOC Analyst

Say goodbye to the entry-level security operations center (SOC) analyst as we know it.

‘Reaper’: The Professional Bot Herder’s Thingbot

Is it malicious? So far it's hard to tell.

For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.

White House Releases New Charter for Using, Disclosing Security Vulnerabilities

Updated Vulnerability Equities Process provides transparency into how government will handle new vulnerabilities that it discovers in vendor products and services.

Fred Kwong: The Psychology of Being a CISO

Security Pro File: Fred Kwong learned people skills in the classroom and technical skills on the job.

The former psychology major, now CISO at Delta Dental, shares his path to cybersecurity and how he applies his liberal arts background to his current ...

Stealthy Android Malware Found in Google Play

Eight apps found infected with a new Trojan family that ups the ante in obfuscation with four payload stages.

Who Am I? Best Practices for Next-Gen Authentication

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.

Forever 21 Informs Shoppers of Data Breach

Forever 21 learned an unauthorized actor may have accessed payment card data at certain retail stores.

NSA Veterans Land $1.5 Million in Funding for Startup

ReFirm Labs' launches Centrifuge Platform, which aims to automatically detect security vulnerabilities in IoT firmware.

Insider Threats: Red Flags and Best Practices

Security pros list red flags indicating an insider attack and best practices to protect against accidental and malicious exposure.