Analysis

Trends and Analysis

IRS Warns Taxpayers of Email Scams

The IRS, along with state tax agencies and the tax industry, urge people to be wary of phishing email scams.

Secret Service Agent’s Laptop With Clinton Hack Probe Details Stolen

The laptop, taken from Brooklyn, also contains information on Trump Tower floor and evacuation plans.

New MagikPOS Malware Targets Point-of-Sale Systems In US & Canada

Malware uses a remote access Trojan to sniff out potential victims first, Trend Micro says.

Trump Budget Adds $61 Million for FBI Cybercrime-Fighting Efforts

The President's 2018 budget blueprint includes a focus on cybersecurity with $1.5 billion for Homeland Security and $50 billion for Defense.

North Korea’s ‘Lazarus’ Likely Behind New Wave of Cyberattacks

Symantec says it has digital evidence that hack group Lazarus is behind the recent sophisticated cyberattacks on 31 countries.

Embrace the Machine & Other Goals for CISOs

Here are five ways we can become more effective for our organizations.

US-CERT Warns That HTTPS Inspection Tools Weaken TLS

Turns out that man-in-the-middling your own traffic isn't the safest way to look for man-in-the-middle attacks.

Mandiant: Financial Cybercriminals Looking More Like Nation-States

As the cybercriminal-cyber espionage connection in the Yahoo breach demonstrates the security challenges facing organizations today.

Sound Waves Used to Hack Common Data Sensors

Though the immediate threat to your smartphone or Fitbit is slight, University of Michigan researchers show command-and-control capability with spoofed signaling on a variety...

In Cyber, Who Do We Trust to Protect the Business?

If business leaders and directors continue to view cybersecurity as mainly a matter for the IT department, they will leave their companies exposed to...

ERP Attack Risks Come into Focus

New highly critical SAP vulnerability highlights dangers against critical business software.

Ethical Hacking: The Most Important Job No One Talks About

If your company doesn't have an ethical hacker on the security team, it's playing a one-sided game of defense against attackers.