October 16, 2017 Cryptocurrency Mining Websites Attract 500 Million Monthly Visitors, According to Report 2 min read - Security researchers discovered that roughly half a billion people visit websites that secretly run cryptocurrency mining scripts every month.
October 16, 2017 No Macros? No Problem for New Malware Attack 2 min read - Security researchers discovered a new malware attack that exploits Dynamic Data Exchange, an outdated Office feature, to infect corporate devices.
October 12, 2017 Cybercrime Group FIN7 Takes Phishing Attacks to the Next Level 2 min read - A cybergang known as FIN7 has been using OLE command files to spread its malware and identify potential victims for additional phishing attacks.
October 12, 2017 37,000 Users Download Phony Adblock Plus App 2 min read - Users who downloaded a phony Adblock Plus app should be on the lookout for a possible data breach. Google has since removed the app from its Chrome Store.
October 12, 2017 Agencies, Assemble! NIST and DHS Join Forces for BGP Security 2 min read - The DHS and NIST launched a new SIDR framework to help organizations bolster border gateway protocol (BGP) security and minimize border gateway attacks.
October 11, 2017 Social Security Numbers Put Personal Data at Risk 2 min read - Social Security numbers act as unique identifiers and, if compromised by fraudsters, can put individuals' personal data at risk.
October 11, 2017 What Can Business Leaders Do to Stay One Step Ahead of a Data Breach? 3 min read - At the Cambridge Cyber Summit, IBM Security General Manager Marc van Zadelhoff offered three pieces of advice to help business prepare for a data breach.
October 10, 2017 Firms Unprepared for Public Disclosure of Cybersecurity Attacks, IBM Security Vice President Warns 2 min read - IBM's Caleb Barlow suggested that most companies are unprepared to effectively respond to cybersecurity attacks after they are publicly disclosed.
October 10, 2017 What the Shell? New Security Breach Uses CHM Files to Cover Banking Trojans 2 min read - A new banking Trojan is using old PowerShell tricks to hide its activity from detection tools by continually launching malicious CHM files.
October 10, 2017 Sloppy Business Behavior to Blame for Cloud Security Leaks, Survey Reveals 2 min read - A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.