Mobile Malware Group Hits Google Play a Third Time
Jeffrey Burt | 6/29/2018 | McAfee researchers found that AsiaHitGroup earlier this year again targeted Android device users in Asia with a bulked-up Sonvpay campaign complete with silent push notifications.
'Bad Bots' Invading Cellular Networks
A new research paper from Distil Networks finds that 'bad bots' are roaming cellular networks and are using these gateways as part of numerous attacks.
Secure by Default Is Not What You Think
The traditional view of secure by default — which has largely been secure out of the box — is too narrow. To broaden your view, consider these three parameters.
Cloud-Based Identity Management Systems: What to Look For
Alan Zeichick | 6/26/2018 | Most of the big cloud players, including Google, Microsoft and AWS, all offer some form of identity and access management. There are plenty of other cloud-based, on-premises IAM systems as well. Here's what you need to look for.
How to Find a Next-Generation Firewall for the Cloud
Alan Zeichick | 6/25/2018 | If you use cloud-based servers for running business applications, you need to protect those servers with a software-based cloud firewall. There are many options, and here's how to choose.
White House Email Security Faux Pas?
The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.
AppSec in the World of 'Serverless'
The term 'application security' still applies to 'serverless' technology, but the line where application settings start and infrastructure ends is blurring.
Olympic Destroyer Returns With Attacks in Europe
Jeffrey Burt | 6/20/2018 | Kaspersky Labs researchers believe the hackers behind the Olympic Destroyer worm that wreaked havoc at the Winter Olympics are now focusing on organizations that research chemical and biological threats in Europe.
Betabot Trojan Reborn in New Sophisticated Form
As far as malware goes, the Betabot Trojan has gone through several different incarnations. However, its latest form might be the most sophisticated and laying the groundwork for an even larger attack.
How to Prepare for 'WannaCry 2.0'
It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.
Is Florida Really Such a Cybersecurity Risk?
Joe Stanganelli | 6/18/2018 | In the wake of a personal-security research report declaring Florida to have the highest level of cybersecurity-risk in the US, a closer look suggests this finding may be neither the most reliable nor the most compelling.
Cisco: Companies More Proactive About Cybersecurity
Jeffrey Burt | 6/14/2018 | The ransomware attacks of 2017 and high-profile credit card system hacks in recent years have convinced organizations that they need to address security before they become victims.
'Shift Left' & the Connected Car
How improving application security in the automotive industry can shorten product development time, reduce costs, and save lives.
Talos: VPNFilter Malware Still Stands at the Ready
Jeffrey Burt | 6/12/2018 | Rebooting routers and the FBI's takeover of the C&C server may have mothballed the threat that infected more than 500,000 routers, but attackers could get it going again, Talos's Craig Williams said at Cisco Live in Orlando.
ISF: Balance Is Key to Mobile Security
Jeffrey Burt | 6/11/2018 | As the workforce becomes more mobile, companies can't lock everything down but also can't risk leaving their mobile environments wide open, Information Security Forum finds.
|