Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity.
Tim Greene |
05 Apr |
Read more
McAfee has officially spun out from Intel, dumping the name Intel Security and under new majority ownership that has deep pockets to help the company more aggressively acquire technology via mergers and acquisitions to supplement its home-grown innovations.
Tim Greene |
04 Apr |
Read more
Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.
Tim Greene |
04 Apr |
Read more
More and more attackers are carrying out their work without using malware so they can evade detection by traditional, file-based security platforms, which presents a tough problem for security pros trying to defend against them.
Tim Greene |
31 Mar |
Read more
The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.
Tim Greene |
29 Mar |
Read more
Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.
Tim Greene |
29 Mar |
Read more
When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.
Tim Greene |
25 Mar |
Read more
If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.
Tim Greene |
24 Mar |
Read more
An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.
Tim Greene |
23 Mar |
Read more
Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.
Tim Greene |
18 Mar |
Read more
Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.
Tim Greene |
16 Mar |
Read more
Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.
Tim Greene |
15 Mar |
Read more
Blackhawk Network gets better visibility into threats with Darktrace Enterprise Immune System, more productivity out of its security analysts and saves money by getting rid of multiple other security platforms.
Tim Greene |
10 Mar |
Read more
Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes the new revelations into account.
Tim Greene |
08 Mar |
Read more
Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are moving around looking for ways to carry out exploits.
Tim Greene |
02 Mar |
Read more