Can good come from bad news?
Threat of the month: Linksys router zero-day
"Smart identification" is just one strategy seeking to replace passwords, says Google's Eric Sachs. Karen Epper Hoffman reports.
In our April Threat Stats, we look at the 400,000 samples of mobile malware collected since the end of November, as well as the top breaches in February.
This new ebook from SC Magazine describes how proactive organizations may prepare for sophisticated attacks by focusing on three key pillars of thought. And how some companies have taken to creating teams of “threat hunters.”
Phishing is all grown up and operated on a large-scale by well-funded cybercriminals who use botnets to harvest personal data and sell it on the black market.