December 5, 2016 Wake-Up Call: Millions of Android Users at Risk of MitM Attacks 2 min read - Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.
December 5, 2016 A Software Attempt to Mitigate Rowhammer Attacks 2 min read - German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
December 2, 2016 Three Ways to Become More Cyber Resilient: Findings From Ponemon’s New Study 2 min read - Findings from the Ponemon Institute's "2016 Cyber Resilient Organization" study suggest that many organizations are unprepared to respond to a cyberattack.
December 1, 2016 Browser Malware Skunks Tor 2 min read - Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.
December 1, 2016 New Proteus Malware: Jerk of All Trades? 2 min read - The Proteus malware enables fraudsters to commandeer devices to act as proxy servers or keyloggers, validate credentials or mine for cryptocurrencies.
November 29, 2016 Backdoor Trojan Spread Via ‘Steganography’ 2 min read - The backdoor Trojan known as Stegoloader infects its victims through a website offering fraudulent activation keys for pirated software.
November 29, 2016 Cognition and the Future of Security 2 min read - The emergence of cognitive computing is driving the future of security, enabling human analysts to make better decisions when responding to data breaches.
November 28, 2016 Securing the Internet of Things: Best Practices From the DHS 2 min read - The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
November 28, 2016 The Technology Team Must Help Manage IT Decentralization, Survey Finds 2 min read - IT decentralization can enable businesses to boost responsiveness and launch new services more quickly, but it can also create a lack of accountability.
November 23, 2016 Security Chiefs Must Embrace the Risk Posed by the Ransomware Epidemic 2 min read - The ransomware epidemic challenges IT executives to adopt effective strategies to turn threats into opportunities to establish better business practices.