December 12, 2016 August Malware Tries to Steal Credentials 2 min read - The August malware, a new Trojan recently discovered by Proofpoint, uses macros and Powershell to target customer service employees at retail companies.
December 12, 2016 Floki Bot: Funny Name, Financial Nightmare? 2 min read - Floki Bot is more versatile than most banking Trojans because it uses spear phishing methods and the RIG exploit kit to steal credit card track data.
December 9, 2016 Positioning Security Intelligence in Front of Incident Response 2 min read - IBM is working to help companies address the challenges they face when adopting a more proactive approach to incident response.
December 8, 2016 Millions of Accounts Exposed in Dailymotion Hack 2 min read - A recent Dailymotion hack means the account details and email addresses of 85 million users have potentially been compromised.
December 8, 2016 Enforcement of iOS’s App Transport Security Is Problematic 2 min read - Despite Apple's plans to begin enforcing its App Transport Security standard at the start of 2017, many iOS app developers are still dragging their feet.
December 8, 2016 Malvertising Poisons Banner Ads 2 min read - A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.
December 6, 2016 Distributed Guessing Attack: Credit Crooks Now Crowdsourcing Crendential Compromise 3 min read - A team of researchers demonstrated a new distributed guessing attack that can enable cybercriminals to ferret out credit data and other login credentials.
December 6, 2016 Global Cybersecurity Survey Shows Confidence Drop 2 min read - According to a recent cybersecurity survey, companies are losing confidence in their ability to assess security risks and mitigate threats.
December 6, 2016 Mobile Security News Roundup: Top Stories From November 2 min read - November's mobile security news roundup covers iCloud insecurity, holiday shopping hazards, Android issues involving plugin Trojans and ad fraud malware.
December 5, 2016 Restricting Recon: SAMRi10 Tool Targets Shifty Cyber Spies 2 min read - Cybercriminals have moved beyond brute force and are now conducting recon on corporate networks. New tool SAMRi10 may help restrict their cyber spying.