Malwarebytes Labs has picked up on Blackhole use in its honeypots, even though it disappeared from view in 2013.
Smart Cities Cybersecurity Guidelines Focus on Technology Choices
The guide provides an overview of the key elements needed to implement technology with a lower risk and exposure to cyber-threats.
Mobile Security Precautions Lag Among Users
A quarter mistakenly believe that deleting sensitive files/folders and locking devices with a passcode are effective and trustworthy precautions.
Microsoft Announces a Rash of New Security Initiatives
Microsoft has outlined a new approach to security, announcing the Cyber Defense Operations Center and cross-company investments.
Cook: ‘We’ll Work with UK but Won’t Stop End-to-End Encryption’
Apple CEO hopeful government will change its tune
Trend Micro: Major Q3 Attacks Could be Sign of Things to Come
Firms must be ready for ‘chain reaction’ attacks.
Casinos and Video Piracy Mark Malware Campaign Affecting 1 Million
A massive malvertising campaign uses a surprising 30+ pieces of malware to infect victims, including CryptoWall and the Bunitu Trojan.
IBM: Ransomware, Insider Threats Top 2015 Cyber-Trends
Amateur hacker carelessness and C-suite attention round out the top four cyber-threat trends of the year.
IBM: Ransomware, Insider Threats Top 2015 Cyber-Trends
Amateur hacker carelessness and C-suite attention round out the top four cyber-threat trends of the year.
RSA Appoints Fresh Strategy Chief
Appointment is a response to the security industry’s threat approach failing “spectacularly.”