Intelligence & Analytics March 30, 2015 Malware Analysis: Investigating the Right Security Alerts 3 min read - Security professionals waste time and money choosing which security alerts to investigate. Automation is a great way to track and analyze threats.
March 27, 2015 Instagram API Bug: Picture Imperfect? 2 min read - Security researcher David Sopas of WebSegura claims there is a potentially massive hole in the Instagram API. Instagram has not yet made moves for a fix.
March 27, 2015 Vawtrak Variant Uses Favicons to Hide Dangerous Malware Files 2 min read - Security researchers say a new form of the Vawtrak malware could be worse than ever before, accessing bank accounts and stealing passwords.
Mainframe March 26, 2015 How STIX, TAXII and CybOX Can Help With Standardizing Threat Information 6 min read - As the security threat landscape evolves, organizations should consider using STIX, TAXII and CybOX to help with standardizing threat information.
Government March 26, 2015 Cybersecurity Legislation Could Be on the Congressional Menu 2 min read - US President Barack Obama has proposed a package of cybersecurity legislation to improve public-private communication and strengthen enforcement.
Application Security March 26, 2015 Ensuring Mobile Transaction Security Through Identification, Authenticity and Trustworthiness 4 min read - Identification, authenticity and trustworthiness can ensure mobile transaction security for financial industry-delivered applications.
March 25, 2015 Trouble at the BIOS Level: LightEater Malware Proof of Concept Shows Major Security Risk 2 min read - Two researchers at the CanSecWest conference showed how the LightEater malware could infect the BIOS in most hardware to take over systems and steal data.
Software Vulnerabilities March 25, 2015 Made for Headlines: Do Designer Vulnerabilities Compromise Security? 3 min read - As vulnerabilities are now branded with catchy names and logos, security researchers should be careful not to compromise the responsible disclosure process
March 24, 2015 PoSeidon Malware Dives Deep Into Retail Systems to Steal Customer Data 2 min read - The so-called PoSeidon malware, discovered by Cisco, is being used to steal credit card data and other information from retail organizations.
Risk Management March 20, 2015 How Organizations Can Rebound From March Madness Mobile Misuse 3 min read - With the help of mobile threat management and user education, your organization can make sure the only March Madness upsets that occur are on the court.