Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

3234554
cybersecurity

iphone security stock

Scammers scare iPhone users into paying to unlock not-really-locked Safari

Apple has patched a bug in the iOS version of Safari that was used by criminals to spook users into paying $125 or more because they thought the browser was broken.

wearables and security primary2

10 things you need to know about the security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

security analytics

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

healthcare data breach ts

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

RIP Raimund Genes, Trend Micro CTO

Raimond Genes, Trend Micro CTO, cybersecurity visionary and an inspiration, is gone but not forgotten.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

Organizations need strategic and proactive threat intelligence programs

Enterprise organizations must move beyond reactive and operational use cases and leverage threat intelligence more aggressively.

Brad Antoniewicz cisco

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event

trump sign immigration eo

Future of tech policy murky under Trump administration

Insiders praise administration's focus on infrastructure and deregulation, but worries linger over immigration policies.

Why is incident response automation and orchestration so hot?

Manual processes limit incident response efficiency and effectiveness, driving the need for incident response automation and orchestration.

IBM's position on Security Analytics and Operations (SOAPA), part 2

Marc van Zadelhoff, general manager of IBM’s security division, discusses SOAPA requirements, intelligence and scale.

10 phishing

How to avoid falling for the W-2 phishing scam

The W-2 scam provides another example of how a security awareness program that adapts to trending threats has an advantage over a one-size-fits-all plan.

IBM's position on Security Analytics and Operations (SOAPA)

Marc van Zadelhoff, general manager of IBM’s security division, talks SOAPA market demand and evolution of the architecture.

1 integrated workloads

Well-funded doesn't mean well-secured

Being able to buy security products doesn't mean your business is secure. You need an integrated, security technology strategy.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

wikileaks

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Cybersecurity

Basic training: Cybersecurity lessons inspired by an opportunistic developer

Five foundational cybersecurity best practices for keeping up with "on-demand, near real-time" data needs

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

Load More