July 15, 2015 Butterfly Effect: Chaos Reigns, From Morpho to Wild Neutron 3 min read - Malware group Butterfly — once called Morpho and Wild Neuton — is after corporate IP. What are the risk factors, and how can companies protect their data?
July 15, 2015 Could Open-Source ‘Census Project’ Prevent the Next OpenSSL Flaw? 2 min read - The Core Infrastructure Initiative has released a ranking of open-source tools that should help the industry avoid problems in OpenSSL and similar tools.
July 14, 2015 Google Uses Artificial Neural Network to Keep Malicious Spam Out of Gmail 2 min read - Google's artificial neural network is now working to recognize spam such as phishing messages in Gmail, which could boost security for thousands of users.
July 14, 2015 When the Canary Stops: New Bitcoin Mining Hack a Wake-Up Call? 2 min read - A recent cyberattack on a bitcoin mining site has many users wondering: Has the canary sung its final song? Could this be the end of the currency?
July 9, 2015 Operation Kofer Signals the New Commoditization of Ransomware 3 min read - A new type of ransomware called Kofer poses a severe threat to Internet users on a global scale, but it's just the tip of the malware iceberg.
July 9, 2015 Kovter Variant Updates Adobe Flash to Fend Off Rival Malware Authors 2 min read - Researchers recently found that the latest version of the Kovter malware is updating Adobe Flash Player as part of a click-fraud scam.
July 7, 2015 Windows 10 Wi-Fi Sharing: Feature or Flaw? 2 min read - Windows 10 Wi-Fi sharing raises worrisome security questions for users who are hesitant to embrace network sharing: Is it better to share or opt out?
July 7, 2015 Data Leak Could Let Almost Anyone Make ZeusVM Malware Variant 2 min read - Source code for the builder and control panel of the ZeusVM malware has been leaked online, creating powerful tools for would-be cybercriminals.
July 7, 2015 Shopping Online? Your Password Is Passe — Selfies Are the New Security 2 min read - According to MasterCard, your password may soon be passe. The company is turning to selfies as the new security measure for online purchases.
July 2, 2015 Crypto, XSS Flaws Rampant in Web Application Software, Study Shows 3 min read - A handful of common and well-known Web application software flaws continue to pose huge problems for organizations across multiple sectors.