Why Hackers Love Healthcare
The migration of valuable data to the cloud is piquing the interest of cybercrimimals. But there are ways to fight back.
Orangeworm Malware Burrows Into Healthcare Industry
Jeffrey Burt | 4/26/2018 | A group of cybercriminals, known collectively as Orangeworm, are using their own malware and a custom backdoor called Kwampirs in highly targeted attacks against healthcare organizations, according to Symantec.
Europe and Asia Take on More DDoS Attacks
Partner Perspectives | 4/26/2018 | While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.
Microsoft: Tech Support Scams on the Rise
A recent report from Microsoft shows that the number of scams using tech support as a cover is on the increase. However, many times it's up to consumers and companies to protect themselves.
Cloud Misconceptions Are Pervasive Across Enterprises
Partner Perspectives | 4/25/2018 | Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.
Smartphones Remain the Most Vulnerable of Endpoints
Simon Marshall | 4/24/2018 | The nature of mobile devices, especially smartphones, continues to make them the most vulnerable of endpoint devices. Here's why enterprise security teams need to stay vigilante.
It's the People: 5 Reasons Why SOC Can't Scale
Alan Zeichick | 4/23/2018 | There are always more security alerts and threats to respond, but the answer isn't to simply throw more money at the SOC to hire additional Tier 1 and Tier 2 security analysts.
Login With Facebook & Watch Your Personal Data Leak
A common feature on many popular websites allows users to login with their Facebook profile. However, a trio of Princeton researchers show that this feature allows personal information to leak and be collected.
Microsoft Security Is Channeling the Terminator
Alan Zeichick | 4/19/2018 | In its own way of channeling the Terminator and Skynet, Microsoft is looking to add more layers of artificial intelligence into its Windows Defender ATP to further reduce remediation and increase automation of security.
In Wake of Spectre & Meltdown, Intel Shifts Memory Scanning to GPU
Jeffrey Burt | 4/19/2018 | At the RSA Conference this week, Intel introduced several silicon-level security technologies, including moving memory scanning from the CPU to the GPU, as part of its larger 'security-first' strategy following the Spectre and Meltdown issues.
Ransomware: Still a Security Threat & Still Evolving
Jeffrey Burt | 4/17/2018 | While ransomware may have faded from the headlines a bit during the first four months of 2018, a bevy of reports from Verizon, Symantec and Webroot find that not only does it remain a top security threat, but it continues to evolve as well.
Data Breach Increase Shows Endpoints Are Under Attack
Joe Stanganelli | 4/16/2018 | The stats and factoids from the latest edition of Verizon's annual Data Breach Investigation Report make clear enterprise endpoints have been far too vulnerable and that explains why data breaches are on the rise.
Beyond Bitcoin: How Blockchain Can Benefit IoT Security
Jeffrey Burt | 4/13/2018 | As the market for the Internet of Things grows, security concerns are increasing. However, a new study shows that blockchain technology can go beyond protecting cryptocurrency to help lock down IoT devices and sensors better than other methods.
Avoiding the Ransomware Mistakes that Crippled Atlanta
Partner Perspectives | 4/11/2018 | What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.
Bastille's ATI System Warning Raises Its Own Alarm
Bastille Networks made a splash by notifying ATI Systems that its warning systems have a significant vulnerability. However, the timing of the notice leaves a question about motives when public safety is at risk.
IoT Malware-on-the-Fly Expected to Rise
Dawn Kawamoto | 4/11/2018 | Researchers discover a new Mirai-variant IoT botnet that appears linked to IoTroop or Reaper botnet, allowing attackers to easily update malicious code on the fly.
|