Endpoint September 20, 2016 What I Learned About Smartphone Dependency on a Himalayan Trek 3 min read - As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.
Government September 16, 2016 The Clinton Security Platform: Addressing the Future of Tech 4 min read - The Clinton security platform may be light on cybersecurity, but the presidential candidate has a lot to say about the future of technology and innovation.
Government September 16, 2016 The Trump Security Platform: Maintaining the GOP Status Quo 2 min read - The Trump security platform views government regulation critically while also assigning high priority to national security regulations.
September 15, 2016 Misconfigured NTP Servers Serve as a DDoS Resource 2 min read - A quarterly report from Akamai found that attackers are increasingly leveraging misconfigured NTP servers to launch DDoS attacks.
September 13, 2016 CryLocker Tries to Hide Its Loot 2 min read - The CryLocker malware family's novel approach to file management makes it difficult for victims to recover their data, even if they pay a ransom.
September 8, 2016 Telnet Ports Subject to Botnets Using Brute-Force 2 min read - Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
Energy & Utility September 8, 2016 Keeping the Lights On: Security Trends in the Energy and Utilities Industry 2 min read - The energy and utilities industry is built on a highly regulated framework — but that doesn't mean it's immune to the threat of a cyberattack.
Malware August 16, 2016 Brazil Can’t Catch a Break: After Panda Comes the Sphinx 4 min read - IBM X-Force researchers uncovered the first Zeus Sphinx attacks in Brazil, which target online banking and payment services in Brazil's top banks.
Government August 10, 2016 Government Data Woes: 2016 Compromised Records Surpass Total for Last Three Years Combined 5 min read - Government entities in the U.S. and abroad have been targeted by malware infections, phishing schemes, SQL injection attacks and more.
Fraud Protection August 10, 2016 Tracking Online Fraud: Check Your Mileage Against Endpoint Data 2 min read - A new study analyzed 500,000 endpoints as a method of tracking online fraud. The 10,000 that were found to be compromised shared seven commonalities.