New LusyPOS malware is a cross between Dexter and Chewbacca
A new piece of Point-of-Sale RAM scraping malware has been submitted to VirusTotal and analyzed by researchers, who found that it’s a cross between two older and …
Firefox 34 comes with critical security updates
Firefox 34 includes eight security updates, three of which are Critical, three High and two moderate. MSFA-2014-91 Privileged access to security wrapped protected objects …
The 2014 Firewall Buyers Guide
NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …
FBI issues warning on destructive malware
Last week’s breach of Sony Pictures Entertainment networks and the disabling of employees’ computers has likely been the incident that spurred the FBI to release a …
Hackers hit execs for insider info to gain stock market advantage
FireEye’s researchers have identified yet another hacking group. Dubbed FIN4, the hacking crew seems to be comprised of native English speakers with “deep …
Coordinated cyber attacks on global critical infrastructure exposed
Cylance identified coordinated attacks by hackers based in Iran on more than 50 targets in 16 countries around the globe. Victim organizations were found in a variety of …
VPN providers urged to update OpenVPN due to critical DoS bug
The OpenVPN Project has issued a new version of its popular open source software of the same name and is urging users to implement it, as it solves a critical denial of …
Data loss and downtime costs enterprises $1.7 trillion
Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany’s GDP. Data loss is up by 400% since 2012 …
Cost savings drive businesses to the cloud
A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …
Training kids to become infosec superheroes
Children today embark on life in two interconnected worlds, the physical and the virtual. And just as they need to learn how to be smart and safe in the physical world, they …
Cyber attacks impact purchasing behavior
As U.S. consumers head to malls and retail websites this holiday season, they do so increasingly concerned about the safety and security of their personal information. In …
Intel acquires digital identity manager PasswordBox
Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …
Featured news
Resources
Don't miss
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade
- Why silent authentication is the smarter way to secure BYOD
- What Fortune 100s are getting wrong about cybersecurity hiring
- SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit