Research

Mobile-derived credentials

It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Report: 31 percent of detected threats in 2014 attributed to Conficker

Report: 31 percent of detected threats in 2014 attributed to Conficker

By

F-Secure noted in its mid-year report that the Conficker worm continues to impact users and that Gameover Zeus still poses a threat.

Researchers reveal security issues in Android apps

By

On Monday, the University of New Haven revealed its first video in a series of security findings.

APT group adapts Windows backdoor to target Mac computers

APT group adapts Windows backdoor to target Mac computers

By

The backdoor, called "XSLCmd," was detected in earlier attacks on Windows systems, FireEye found.

Report: China's underground activity doubled last year

Report: China's underground activity doubled last year

By

Trend Micro found that compromised hosts, DDoS attack services and remote access trojans were the most coveted offerings in the marketplace last year.

'KorBanker' steals SMS messages, takes authentication codes in the process

'KorBanker' steals SMS messages, takes authentication codes in the process

By

Android devices in Korea have primarily been impacted by the malware.

Security foundation also warns of Netis router backdoor

By

Trend Micro first alerted the public to the backdoor affecting Netis and Netcore brand routers.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm RAT

By

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.

IEEE Computer Society shares top security design flaws

By

The group's Center for Secure Design released a report detailing how to avoid common design flaws.

Threat report on Swedish firms shows 93 percent were breached

By

The study by KPMG and FireEye also found that 49 percent of detected malware was unknown.

Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds

Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds

By

On Wednesday, HP TippingPoint released its State of Network Security survey which polled hundreds of professionals.

Study shows how attackers make use of websites existing for less than 24 hours

Study shows how attackers make use of websites existing for less than 24 hours

By

Looking at the top 50 of parent domains that produced websites existing for less than 24 hours, researchers with Blue Coat Security Labs observed that 22 percent were malicious.

IBM projects 2014 bug disclosures may hit three-year low

IBM projects 2014 bug disclosures may hit three-year low

By

The number of disclosed vulnerabilities is on track to fall below 8,000 this year, a first since 2011.

Researchers warn of backdoor in Netis, Netcore routers

By

The routers are sold in China under the Netcore brand name, and elsewhere as Netis products.

New variants of POS malware 'Backoff' found as infections expand

New variants of POS malware 'Backoff' found as infections expand

By

The Secret Service said that over 1,000 U.S. businesses have been infected with the malware.

FireEye examines popular Google Play apps, 68 percent have SSL flaws

FireEye examines popular Google Play apps, 68 percent have SSL flaws

By

The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.

Rogue AV scammers find success with new tactics

By

Although the number of rogue anti-virus malware campaigns have decreased overall, the threat isn't totally gone, according to researchers at Microsoft.

Study: Most higher ed malware infections attributed to 'Flashback'

Study: Most higher ed malware infections attributed to 'Flashback'

By

Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware.

With Black Hat and DefCon comes spike in Vegas-based attacks

By

A recent study found that the number of attacks during the two conferences increased to about 130 times the usual amount.

Volumetric DDoS activity up big-time in Q2 2014, report indicates

Volumetric DDoS activity up big-time in Q2 2014, report indicates

By

In the second quarter of 2014, Verisign researchers noted a spike in volumetric DDoS activity when compared to previous quarters.

Ransomware crooks claim private key database is for sale

By

SynoLocker attackers said the database of keys was available for $100,000.

Malware threatens virtual machines, according to report

Malware threatens virtual machines, according to report

By

Malware has become a threat to virtual machines and, nowadays, should be incorporated into security strategy, according to a Symantec report.

Two new Gameover Zeus variants in the wild

Two new Gameover Zeus variants in the wild

By

About two months after botnet takedown efforts, new versions of the malware have surfaced in the U.S. and abroad.

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

By

Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

Black Hat: Researcher demonstrates how he controlled room devices in luxury hotel

By

An insecure home automation protocol allowed the hacker to control room amenities, like lights, TVs and temperature settings.

More than a billion unique credentials pilfered by Russian hackers

More than a billion unique credentials pilfered by Russian hackers

By

Hold Security identified a Russian hacker group, dubbed "CyberVor," that is in possession of more than a billion unique credentials.

PayPal addressing another two-factor authentication bypass

PayPal addressing another two-factor authentication bypass

By

An Australian researcher has discovered and posted a method for getting past PayPal's two-factor authentication, but it requires primary credentials.

Researchers still find iOS apps to be riskier than Android apps

By

A report reveals that 87 percent of the top paid iOS apps exhibit at least one risky behavior, whereas only 77 percent of the top paid Android apps did the same.

"Poweliks" downloads additional malware, abuses PowerShell

By

Poweliks abuses Windows PowerShell to try to remain undetected.

Sign up to our newsletters

POLL