endpoint security
How to protect from threats against USB enabled devices
Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …
Hack air-gapped computers using heat
Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …
Beware of spyware concealed inside games
Monitoring tools can be used for legitimate and malicious purposes. The first category includes parental control and employee monitoring software, the second one screenshot …
Real MITM attacks enabled by Komodia’s software might have already happened
When the issue of Lenovo’s pre-installed SSL-breaking Superfish adware first gained widespread media recognition, the company’s CTO Peter Hortensius tried to do …
Concerns around endpoint security
The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …
How to wipe Superfish adware and offending cert from your Lenovo laptop
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
Browser vulnerabilities to become biggest endpoint challenge
A growing number of flaws in web browsers is viewed as the biggest endpoint security headache by today’s IT decision-makers, according to Malwarebytes. With the number …
Dynamic endpoint protection by McAfee and ForeScout
ForeScout Technologies and McAfee, part of Intel Security, have partnered to provide a new and enhanced interoperability between ForeScout CounterACT and McAfee solutions. The …
New BlackPOS variant masquerades as AV service
Before the Backoff point-of-sale malware received deserved attention, the main player in the PoS malware field was BlackPOS (or Kaptoxa), the memory-scraping malware that was …
Unified solution for dynamic mitigation of cyberattacks
At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …