A long-overdue change
Several high-profile websites were impacted by a malvertising campaign, which Fox-IT helped dismantle.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
A flaw in Apple's popular music player allows for miscreants to execute remote code.
Apple on Monday released an updated version of its iTunes program to close a vulnerability that could lead to a man-in-the-middle attack.