July 24, 2017 More Than 500,000 Systems Infected by Stantinko Malware Since 2012 2 min read - Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.
July 24, 2017 Cybersecurity Threats Create Growing Risk of Destruction of Service 2 min read - As dangerous attacks evolve, IT teams must proactively combat cybersecurity threats and decrease the time to detection within their networks.
July 24, 2017 Rapid Revision: New CryptoMix Strains Picking Up Speed 2 min read - New variants of CryptoMix malware are quickly making the rounds, holding files ransom and demanding victims fork over the bitcoin.
July 20, 2017 Samba Vulnerability Exposes NAS Devices to SHELLBIND Malware 2 min read - The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
July 20, 2017 Google Adds Verification Screens for Plugins Following Phishing Attacks 2 min read - Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.
July 20, 2017 New Devil’s Ivy Vulnerability Causing Rash of IoT Risks 2 min read - A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.
July 19, 2017 Wimbledon 2017: Manicured Lawns, Ivy-Covered Buildings, Tennis Whites and Cyberattacks 3 min read - IBM's Watson for Cyber Security assisted in protecting the pinnacle of tennis achievement, Wimbledon, from cyberattacks.
July 18, 2017 Google Advances Two-Step Verification 2 min read - Google is changing how it does two-step verification by replacing one-time SMS codes with new features and login protocols.
July 18, 2017 WordPress Sites at Risk From PHP Code Execution 2 min read - New attacks against unfinished installations of WordPress aim to give attackers admin access and the opportunity to run PHP code.
July 18, 2017 GhostCtrl Android RAT Demonstrates Spooky Range of Capabilities 2 min read - Security researchers recently uncovered a scary version of GhostCtrl, an Android RAT with advanced capabilities that can be very difficult to detect.