July 25, 2017 Bugging Out: Fruitfly Malware Swarms MacOS Users 3 min read - A new strain of FruitFly malware has infected hundreds of users, possibly over the last 10 years. The malware is insidious, spying on MacOS users.
June 29, 2017 Svpeng Stings Users With Threefold Boost to Mobile Ransomware 2 min read - Kaspersky Lab has reported that mobile ransomware infections are on the rise to booming strains of the Svpeng malware family.
Healthcare June 29, 2017 Maintaining CIA to Keep Health Care Security Threats at Bay 4 min read - Health care security threats that compromise the confidentiality, integrity and availability of critical data can force hospitals to halt operations.
Network June 27, 2017 Execute Your IoT Deployment by the Book 2 min read - More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
Endpoint June 26, 2017 Should We Disconnect to Improve IoT Security? 3 min read - There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.
June 21, 2017 DVRs Prove IoT Malware Is Still Dangerous 2 min read - With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
Endpoint June 21, 2017 More Mobile Apps Means More Man-in-the-Middle Attacks 2 min read - Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
June 12, 2017 New Android Cleaning App Pulls Dirty Tricks to Grab Admin Rights 2 min read - A new Android app that claims to clean a device actually grabs admin rights to carry out malicious actions — and proves almost impossible to scrub out.
Intelligence & Analytics June 8, 2017 Securing Your Enterprise Assets While Traveling for Work 3 min read - It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.
Endpoint June 5, 2017 Four Key Considerations for Managing Your IoT Population 3 min read - To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.