May 4, 2015 Nepal Earthquake Email Scams Could Lead Would-Be Donors to Malware 2 min read - Authorities say Nepal earthquake email scams could be directing users to phishing sites that contain malware under the guise of giving to charity.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.
Endpoint April 9, 2015 Gone Phishing: How to Prevent Sophisticated Attacks 3 min read - Phishing attacks have become much more targeted and alarmingly personalized, exploiting our personal information and the products we use.
Malware April 2, 2015 The Dyre Wolf Campaign: Stealing Millions and Hungry for More 3 min read - A new Dyre malware campaign, branded "The Dyre Wolf" by IBM Security researchers, has successfully stolen more than $1 million from targeted organizations.
Banking & Finance March 2, 2015 Carbanak: It’s All About the Phish 3 min read - The Carbanak banking malware, which was recently reported by Kaspersky Lab, is potentially the most advanced malware design to date.
February 20, 2015 IRS Warns Taxpayers of Spear Phishing Scam 2 min read - The IRS has warned that cybercriminals are using bogus emails and voicemail messages in a spear phishing scam to steal personal information at tax time.
Advanced Threats February 17, 2015 Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks 3 min read - A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
Advanced Threats February 5, 2015 Who Hacked Sony? New Report Raises More Questions About Scandalous Breach 4 min read - According to a new report, Russian cybercriminals used spear-phishing attacks to breach Sony Pictures Entertainment at the end of 2014.
X-Force January 21, 2015 ‘Blackhat’: Hollywood’s Latest Take on Hacking 3 min read - "Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
Endpoint January 14, 2015 German Steel Mill Meltdown: Rising Stakes in the Internet of Things 3 min read - The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.