March 10, 2016 Leaping Linux: New KeRanger Ransomware Identified as Modified V4 Linux.Encoder 2 min read - The newly discovered KeRanger ransomware can be used in attacks on Mac OS X thanks to its Linux source code, undermining many perceptions about the OS.
March 10, 2016 Java Malware Becomes a Cross-Platform Threat 2 min read - The Java malware dropper can run on most major computer platforms, making this a cross-platform threat that puts all users at risk.
March 8, 2016 Does Bitcoin Need a Higher Block Size or Transaction Fee? 2 min read - Bitcoin must change to allow for its widespread use or risk falling behind due to a lack of space on the blockchain or inflexible transaction fees.
March 7, 2016 New W-2 Phishing Attacks Tax Corporate Patience 2 min read - Cybercriminals are targeting organizations via phishing attacks that attempt to steal W-2 tax forms and personal or financial data.
March 7, 2016 Firefox OS Reinvented for the Internet of Things 2 min read - Mozilla is reinventing its Firefox OS so it can act as a network for the Internet of Things (IoT). Several projects hope to further this aim.
March 7, 2016 Cybersecurity C-Suite Challenge: Jumping the Action Gap 2 min read - Of the many challenges facing cybersecurity teams and initiatives in the business world, one of the biggest is getting the C-suite involved.
March 7, 2016 OpenSSL Keys Are Vulnerable to a Smartphone Listening Exploit 2 min read - A simple hardware listening system can expose the OpenSSL crypto keys used for smartphones to cybercriminals, putting users at risk.
March 3, 2016 New PHP Ransomware Looks to Websites for Windfall 2 min read - PHP ransomware is enabling cybercriminals to take over entire Web pages and broadcast their exploits to the masses, bringing in major paydays.
March 3, 2016 OpenSSL Can Be DROWNed by New Vulnerability 2 min read - OpenSSL is vulnerable to DROWN, an attack based on support for the obsolete SSLv2 protocol, which leaves OpenSSL programs at risk.
March 2, 2016 Next-Gen Endpoint Security Tools: Ready to Pull the Plug on Antivirus? 2 min read - Next-generation endpoint security solutions are poised to overtake traditional antivirus tools as the go-to for security teams.