IT organizations are wasting valuable time and money hunting down false positives while advanced persistent threats evade preventive controls.
A session at IBM InterConnect will discuss the vulnerabilities that rocked the Internet in 2014, such as Heartbleed and Shellshock, and what may come next.
The Superfish adware has been exposing Lenovo PC users to prying eyes from cybercriminals. Here is a roundup of the essential facts.
Kicking off 2015 with a bang, a well-orchestrated advanced persistent threat attack dubbed Carbanak has hit banks across the globe.
Commercially available surveillance tools pose a mobile malware threat to enterprise data, according to a recent report from Lacoon Mobile Security.
More than 75 percent of enterprises have been infiltrated by browser-borne malware. What steps can companies take to protect against broken Web browsers?
Organizations' mobile authentication methods must take risk levels and context into account in order to determine whether device access is legitimate.
When discussing the darknet, the focus has shifted from its use as infrastructure for malware communication to the hidden services it offers.
A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
After reviving the Regin dispatcher module, Mark Yason ended up with a malware sample that was suitable for both static and dynamic analysis.