April 9, 2015 Security Flaw Pushes Mozilla to Disable Firefox Opportunistic Encryption Capability 2 min read - According to Mozilla, it has disabled its Firefox opportunistic encryption capability after a security flaw that allowed for MitM attacks was discovered.
February 23, 2015 Everything You Need to Know About the Lenovo Superfish Adware Incident 2 min read - The Superfish adware has been exposing Lenovo PC users to prying eyes from cybercriminals. Here is a roundup of the essential facts.
Advanced Threats February 17, 2015 Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks 3 min read - A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
January 14, 2015 Skeleton Key Malware Provides Scary Attack Method on Active Directory Users 2 min read - Organizations that only use single-factor authentication for Microsoft Active Directory access could fall victim to the Skeleton Key malware.
January 7, 2015 Intel, Two Others Patch Firmware Vulnerability 2 min read - Intel and two other vendors have reportedly patched a firmware vulnerability that can affect some Unified Extensible Firmware Interface (UEFI) systems.
December 16, 2014 Wire Transfer Spam: Upatre Goes for Broke 2 min read - Microsoft recently discovered a spam campaign spreading the notorious Trojan:Win32/Upatre downloader. Users are warned not to accept the wire transfer.
Identity & Access November 26, 2014 Directory Management for Office 365 Access 3 min read - Small companies contributed to the success of directory management for Office 365 access, Microsoft's cloud subscription application suite.
X-Force November 11, 2014 IBM X-Force Researcher Finds Significant Vulnerability in Microsoft Windows 6 min read - The IBM X-Force Research team has identified a significant vulnerability (CVE-2014-6332) in every version of Microsoft Internet Explorer since 3.0.
October 31, 2014 Microsoft: Crowti Ransomware Infections Spiking 2 min read - A sharp increase in Crowti ransomware infections during October is the latest indication that spam emails are still effective, according to Microsoft.
Software Vulnerabilities August 29, 2014 Understanding IE’s New Exploit Mitigations: The Memory Protector and the Isolated Heap 6 min read - In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.