December 23, 2016 ‘Twas the Hack Before Christmas < 1 min read - 'Twas the hack before Christmas, the time late December. While IT professionals are home with family members, cybercriminals are planning their next moves.
December 22, 2016 Revised Mobile Banking Trojans Faketoken and Tordow 2.0 Threaten Customer Information and Business Integrity 2 min read - Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.
December 21, 2016 The Move to Multifactor Authentication: Are Passwords Past Their Prime? 2 min read - According to a recent survey, 93 percent of organizations use multifactor authentication to protect user accounts and corporate networks from cybercrooks.
December 21, 2016 Ameriprise Leak Highlights the Crucial Role of Password Protection 2 min read - The Ameriprise leak exposed sensitive financial data and highlighted the importance of password protection, especially when backing up confidential data.
December 20, 2016 Phishing Email Scam Hooks Government Staff, Reels In Huge Amounts of Personal Data 2 min read - A recently disclosed phishing email scam targeted more than 100 government employees in LA County and exposed more than 750,000 private citizen records.
December 20, 2016 Outpacing the Threat With Dynamic Playbooks 2 min read - Dynamic Playbooks empower security teams to respond to complex incidents with agile workflows and response plans that adapt as new information is revealed.
December 20, 2016 Turkey Impairs Tor Network 2 min read - Following the statutes on restricting VPNs that was enacted by the Turkish government in November, it seems that the Tor network has also been affected.
December 19, 2016 Zero-Day Exploits Affect Desktop Linux 2 min read - A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
December 19, 2016 The IT Skills Shortage Is Putting Businesses at Risk 2 min read - The IT skills shortage is becoming critical, and the lack of suitably skilled cybersecurity expertise means business are being attacked.
December 19, 2016 Root of the Problem? Tordow Malware 2.0 Goes After Top Android Permissions 2 min read - Experts believe the new iteration of Tordow malware, which targets root access to take total control of infected devices, could become a worldwide threat.