November 11, 2015 Friday Is Peak Malware Distribution Day, Study Shows 3 min read - Malware distribution tends to peak on Friday, according to a new study from Cyren. Here's what else the report had to say about cyberthreats.
November 10, 2015 SAP Vulnerabilities Shaking HANA’s Tree, Could Lead to Data Breach 2 min read - A new set of SAP HANA vulnerabilities could put corporate data at risk of severe, remote attacks and possible data breach if left unpatched.
November 10, 2015 Send in the Devs? Data Breach Prep Demands Team Effort 2 min read - Application developers need to be involved with boardroom executives from the start if companies hope to effectively avoid a data breach.
November 6, 2015 University Researchers Show How Widely Mobile Apps Share Users’ Personal Information 2 min read - Harvard, MIT and Carnegie Mellon teamed up to show just how much of users' personal information is shared by smartphone applications.
November 6, 2015 OmniRAT Takes Over Android Devices Through Social Engineering Tricks 2 min read - Cybercriminals could be leveraging remote tools such as OmniRAT to take over Android devices and steal data from unsuspecting victims.
November 6, 2015 Search for Cybersecurity Professionals Fires Up With New NIST Heat Map 2 min read - Cybersecurity professionals looking for work can help fire up their job search with NIST's new heat map tool, which helps identify open positions.
November 5, 2015 Google’s Project Zero Discovers 11 Security Issues in Galaxy S6 Edge 2 min read - The team at Google's Project Zero has discovered 11 high-impact security issues in Galaxy S6 Edge devices, and Samsung is moving to patch quickly.
November 4, 2015 Gold Standard? Security Startup Earns $35 Million From Goldman Sachs 2 min read - Security startup iboss just received $35 million in Series A funding from Goldman Sachs — can their anomaly detection offering help Sachs stay relevant?
November 4, 2015 Researchers Warn Cybercriminals Could Bypass Microsoft EMET via WoW64 2 min read - Researchers at Duo Labs have shown how easily Microsoft EMET can be bypassed via WoW64.
November 4, 2015 D-N-Ain’t? Genome Sharing Vulnerability Spells Possible Privacy Issues 2 min read - A recently discovered vulnerability puts a new type of information at risk for data breaches: DNA. What's the real risk involved here?