September 28, 2015 New IoT Security Foundation Looks for Confidence in Collaboration 2 min read - IoT security is getting a boost thanks to a new nonprofit organization focused on "promoting excellence" in this emerging field.
September 24, 2015 Google Makes Drive and Gmail More Secure Amid Malware Discovery on Google Play 2 min read - As malware continues to invade the Google Play app store, Google is trying to make programs like Gmail and Drive more secure for all users.
September 17, 2015 Three-Week Malvertising Campaign Exposes Security Holes in Online Ad Process 2 min read - Researchers recently discovered a malvertising campaign that ran undetected for weeks, calling attention to the need for stricter online ad security.
Intelligence & Analytics September 16, 2015 Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough 5 min read - Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
Malware September 14, 2015 Don’t Click on That! Practical User Education for Ransomware and Other Malware 4 min read - Malware and ransomware can strike users who aren't aware of best practices or common attack techniques, so it's up to security teams to raise awareness.
Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
Malware September 1, 2015 The Myth of the Obvious Malware 4 min read - Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
Malware August 28, 2015 Watch Out for CoreBot, New Stealer in the Wild 5 min read - IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?