Thursday, January 18, 2018

Organizations In 40 Countries Under ‘Invisible’ Cyber Attacks

Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns.

Organizations In 40 Countries Under ‘Invisible’ Cyberattacks

Unknown threat actors are stealing sensitive financial data using memory resident malware crafted from legitimate tools, Kaspersky Lab warns.

Facebook Aims To Shape Stronger Security Practices

Facebook is among social platforms focusing on security as social media poses a growing risk to individuals and businesses.

Sophos Acquisition Targets Endpoint Security

Sophos buys Invincea to bring next-gen malware protection and machine learning into its product portfolio.

Sophos Acquisition Targets Next-Gen Endpoint Security

Sophos buys Invincea to bring next-gen malware protection and machine learning into its product portfolio.

What to Watch (& Avoid) At RSAC

A renowned security veteran shares his RSA dance card, offering views on technologies destined for the dustbin of history and those that will move the industry forward.

David Beckham Hires Cybersecurity Expert To Probe Email Leak

18.6 million emails were stolen and leaked from PR firm, including allegedly doctored messages made to damage Beckham's reputation.

Dutch Voter Guide Website Leak Highlights Privacy Concerns

StemWijzer fixes vulnerabilities after researcher discovers website is secretly maintaining voter-preference record.

Cloud Storage The New Favorite Target Of Phishing Attacks

2016 data shows that phishing scams involving brands like Google and DropBox will soon overtake scams involving financial companies, PhishLabs says.

New Method Can Catch Smartphone Thieves In 14 Seconds

New research from Ben-Gurion University of the Negev shows promise in quickly identifying smartphone hackers.

Enterprise Android Vs iOS: Which is More Secure?

The answer is not as simple as you think.

A mobile security expert parses the pros and cons.

The Promise & Peril Of The App Era

Sure, apps are convenient.

But when not properly assessed, they can cause security holes.