Security News & Reviews - Page 3

More Security News

Zbot botnet

Hajime Botnet Malware Observed Infecting 300,000 Unsecure IoT Devices

|
Manufacturers fail to eradicate simple security flaws in network-connected devices, allowing attackers to infect hundreds of thousands with malware that turn them into botnet nodes.
Cyber attacks and money

Cyber-Attacks Continue to Be Financially Motivated, Verizon Finds SLIDESHOW

|
Verizon's 2017 Data Breach Investigations Report finds that hacking and malware are the leading causes of breaches, with ransomware use growing.
Cloudflare Orbit

Cloudflare Debuts Orbit Security Service to Protect IoT Devices

|
New service from Cloudflare provides a buffer network for IoT devices that can help protect against unpatched vulnerabilities and cyber-attacks.
1088_VCCashInfusion

VC Cash Infusion Helping Security Vendors Bolster Efforts SLIDESHOW

|
The security sector remains hot, and venture capitalists are looking to profit by investing in various areas of the market. This slide show looks at seven security vendors that raised venture funding in April.
Verizon 2017 DBIR

Verizon Data Breach Investigations Report Reveals Ransomware Surge

|
While some numbers have shifted, a Verizon researcher says that, year-over-year, little has actually changed and the same types of attacks continue to be successful.
RiskIQ

RiskIQ Discovers NoTrove Cyber-Attack Network Delivering Scam Ads

|
The NoTrove online scam advertising network makes use of thousands of different domains to deliver payloads and potentially unwanted programs.
1088_RansomewareRecovery

Ransomware Recovery 101: You've Been Hit, Now What Do You Do? SLIDESHOW

|
Even though the majority of companies will at some point experience a ransomware attack, most do not know how to appropriately recover from one. Here's what you should do.
Symantec ISTR

Cyber-Attackers Using Legitimate Tools, Symantec Reports

|
According to Symantec, attackers are increasingly "living off the land," using email, macros and Powershell to exploit end users.
Shadow IT Malware Threats

Shadow Cloud IT Keeps Rising With Cloud App Adoption, Netskope Finds

|
Shadow IT continues to present a problem as the average number of cloud services in use per enterprise rose to 1,071, up from 1031 during the previous quarter, according to the company's latest study.
1088_RiskyOnlineBehavior

Employees Continue to Engage in Risky Online Behaviors, Study Finds SLIDESHOW

|
Dell Security's end-user security survey reveals common activities that could be exposing global organizations to security risk.
connected car

Hyundai Mobile App Patched for Car Hacking Vulnerabilities

|
Security firm Rapid7 discloses flaws in Hyundai Motor America's Blue Link mobile app that could have potentially enabled a hacker to attack a vehicle.
The Update Framework

How The Update Framework Improves Security of Software Updates

|
Simply using HTTPS to make sure a software update is secure isn't enough to fully validate that a given update hasn't been tampered with. That's where The Update Framework can help.

Enterprise Tech Videos