In this sponsored video, Don Gray, chief security strategist at Solutionary, sits with Illena Armstrong, VP of editorial at SC Magazine, to discuss today's threat landscape and some of the technology that may complicate matters at time.
From cross-site scripting to SQL injection attacks, in this sponsored video Julien Bellanger, co-founder and CEO of Prevoty, discusses today's threat landscape with Teri Robinson, associate editor at SC Magazine.
Researchers with BAE Systems Applied Intelligence have determined that a possibly Russian-fueled malware campaign known as Snake, or Uroburos, may actually date back as far as 2006.
A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.
The North Dakota University System is notifying more than 290,000 former and current students and roughly 780 faculty and staff that their personal information may be at risk after an unauthorized party gained access a server.
Researchers have discovered a Gameover variant of the Zeus trojan that has been modified to include the Necurs rootkit, which makes the malware tougher to detect and remove by protecting files on the disk and memory.
Attackers have remotely altered DNS configurations for more than 300,000 small office/home office routers, subsequently opening up victims to a host of compromises.
On the same day that an attacker stole 896 bitcoins from Bitcoin bank Flexcoin, an individual allegedly posted the Mt. Gox code on Pastebin.
A Russian agency could be behind a sophisticated piece of malware known as Uroburos that has potentially been stealing confidential data from governments and other high profile targets since as far back as 2011.
Social networking portal Meetup has been hit with a prolonged distributed denial-of-service (DDoS) attack that has caused intermittent outages for days.
In the aftermath of the Target breach, there is a huge need for all the people who are engaging with technology to understand more about cyber threats and ways they can account for these before and after something goes down.
A spate of recent DDoS attacks forced banks to change their threat response - and that's a good thing, reports Teri Robinson.
Small and midsized businesses are not exempt from cyber attack, reports James Hale.
It's time to admit that the bad guys can always make a first move, says Damballa's Manos Antonakakis.
Two Trend Micro experts sit with us to discuss research they've conducted concerning critical infrastructure and the future of the threat landscape.
Yair Amit, CTO of Skycure, discusses his company's recent discover of an iOS vulnerability that allows for concealed mobile attack and demonstrates an example of the hack.
In light of the RSA-NSA controversy, a number of speakers, who originally planned to speak at RSA Conference 2014, pulled out and formed a lineup for TrustyCon.
Jeff Forristal demonstrated the hack during a session on "predatory hacking of mobile devices."
In this video, Teri Robinson, associate editor at SC Magazine, discusses the threats surrounding open APIs with Ken Silva, senior vice president at ManTech International, at this year's RSA Conference in San Francisco.
Two senior security researchers have detailed how hackers can use "touchlogging" attack techniques to take control of iOS and Android devices.
Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
In this video Neal Hindocha of Trustwave demos a mobile hack that affects iOS and Android users.
The masses won't ditch passwords until authentication alternatives become more practical in the everyday lives of users, experts said.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
Nawaf Bitar, a senior exec at Juniper Networks, told attendees that the next world war could very well take place on a cyber battle field.
Verizon Risk researchers Kevin Thompson and Suzanne Widup have been crunching some numbers of data breaches...and they reckon that the number may be higher than you think.
YouTube's ad network was compromised to host the Styx exploit kit, researchers found.
Today's targeted attacks use advanced malware designed to defeat IT security controls through a variety of approaches that either confuse or avoid them altogether.
iBanking mobile malware was first introduced to the underground market late last year, according to RSA.
According to FireEye, the flaw was being actively exploited to target foreign policy and defense organizations.