A survey of Canadian business execs found that just over a quarter had experienced a cyber attack.
Careful control of administrator rights in the very foundation of IT Security. Allowing admin rights exposes a dangerous security risk, creating an easy entry point for advanced persistent threats, zero-day attacks and sophisticated malware.
The CryptoWall ransomware being delivered comes with a valid digital signature and initial VirusTotal results showed zero detections.
Disgruntled and former employees have been increasingly engaging in computer network exploitation and disruption.
Fake emails that appear to come from an authentic LogMeIn address state that the company has released a new security certificate.
Since the year's start, the number of exploits used by the kit has doubled, Trend Micro found.
Retail organizations have long been the target of financially-motivated crime. According to Verizon, 92% of the retail breaches they've studied were committed by external actors.
WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation.
Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry.
Nuix believes the malware found on Home Depot's systems belongs to a different threat family.
On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector
On Monday, the University of New Haven revealed its first video in a series of security findings.
Salesforce posted a notification that its users are possibly being targeted by Dyre malware and offered some recommendations to avoid the threat.
Out of 16,000 business users who took the McAfee Phishing Quiz, 80 percent fell for at least one of seven phishing emails.
The backdoor, called "XSLCmd," was detected in earlier attacks on Windows systems, FireEye found.
Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.
Late last month a group of attackers targeted the web hosting company's login portal to try and access users' accounts.
High-Tech Bridge discovered two SQL injection vulnerabilities in All In One WordPress Security and Firewall plugin and notified the vendor.
Android devices in Korea have primarily been impacted by the malware.
Researchers with Kaspersky Lab were able to sinkhole two command-and-control servers used by certain Backoff point-of-sale malware samples.
Trend Micro first alerted the public to the backdoor affecting Netis and Netcore brand routers.
Protecting your organization from attacks brought into the system by email is an ongoing challenge, says Peter Stephenson, technology editor.
The interruption of the cyberattack kill chain through the use of intelligence-driven security has been touted as the better way forward.
Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.
This month's news briefs cover a preliminary settlement Sony will bear for the exposure of 77 million customers, and more.
We take a closer look at SVPENG, malware that's capable of launching two different types of attacks.
Have effective changes been instituted to protect organizations from other Snowdens or negligent employees?
A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.
FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.
Several high-profile websites were impacted by a malvertising campaign, which Fox-IT helped dismantle.