Fraud Protection October 12, 2015 The Dyre Trojan and the Art of War < 1 min read - The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
October 9, 2015 New Remote-Access Trojan Skitters Through Security Undetected 3 min read - A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
October 9, 2015 Meet the White Team, Makers of the Linux.Wifatch Viligante Malware 2 min read - The White Team revealed themselves to be the developers behind Linux.Wifatch, the vigilante malware that was protecting routers from attacks.
October 7, 2015 Research Shows How a Webmail Server Like OWA Could Offer an Opening to Cybercriminals 2 min read - A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.
Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
Malware October 7, 2015 Ransomware Evolves and Enjoys a New Playground 3 min read - Ransomware has worked for cybercriminals for many years, and it continues to be a valuable tool in their arsenal as it evolves to suit the times.
October 6, 2015 Linux.Wifatch: The Router Virus That May Be Secretly Defending You From Other Malware 2 min read - A hacker may be helping protect unsuspecting users from malware through the Linux.Wifatch router virus, which protects home networks from botnets.
October 5, 2015 From the Grave: Adobe Exploit Rises Again 2 min read - An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
October 1, 2015 Bad Words: Curse of Macro Malware Makes a Comeback 2 min read - Macro malware is making a comeback in the form of malicious email attachments. How do companies avoid the curse of bad Word docs?
Malware September 30, 2015 Ransomware Goes Back to the Future 3 min read - Ransomware remains a common attack, and it will continue to be a popular choice for cybercriminals until enterprises improve end user education.