June 1, 2016 No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs 2 min read - A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
May 30, 2016 Sandjacking: New iOS Threat Lets Attackers Out of the Box 2 min read - A newly discovered iOS threat called sandjacking could affect any user or app if cybercriminals gain physical access to a mobile device.
Advanced Threats May 27, 2016 Bug Poaching: A New Extortion Tactic Targeting Enterprises 4 min read - Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.
May 26, 2016 Stuck in the Middle: MitM Attacks Could Stem From Well-Intentioned WPAD Use 2 min read - Enterprises may have had lofty intentions for the use of the WPAD protocol, but the reality is that it could expose them to MitM attacks.
May 26, 2016 Pastejacking: The Clipboard Copy Concern? 2 min read - A new exploit called pastejacking results in victims unwittingly infecting their own machines thanks to malicious code hidden in seemingly normal text.
Application Security May 26, 2016 Inside the Mind of a Hacker: Attacking the Shell 4 min read - To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Advanced Threats May 24, 2016 Q1 2016 Saw a Record High for Ransomware 4 min read - The first quarter of 2016 had a record high for ransomware infections, highlighting the need for better backup and restoration strategies.
May 19, 2016 Furtim Malware: As Stealthy as Its Name Implies 2 min read - A recently discovered malware called Furtim goes to extreme lengths to avoid being discovered. Here's what you need to know about this threat.
May 18, 2016 Bad Medicine? Symantec Antivirus Comes With Easy Exploit 2 min read - An antivirus security tool from Symantec has a serious vulnerability that can be leveraged for easy exploits if users don't patch immediately.
Application Security May 12, 2016 Inside the Mind of a Hacker: Attacking Databases With SQL Injection 4 min read - Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.