Corporate Partners

Top IT Security Bloggers

  • TorrentLocker Run Hits Italian Targets

    Trend Micro - Security Intelligence
    We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and also encrypts various files and forces users to pay a sum of money. TorrentLocker uses the TOR anonymity network to hide its network traffic, which may have been […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Run Hits Italian Targets
  • TorrentLocker Run Hits Italian Targets

    TrendLabs - Malware Blog
    We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and also encrypts various files and forces users to pay a sum of money. TorrentLocker uses the TOR anonymity network to hide its network traffic, which may have been […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Run Hits Italian Targets
  • Keep Your Business’s Data Safe in the Cloud

    Trend Micro - Cloud Security Blog
    In the days before cloud was an enterprise thing, back when systems, networks and perimeters were much more clearly defined, information security teams of course still had concerns to address and data to secure. One of the emerging risks in the mid-nineties earned the name of “Shadow IT.” And it’s still with us today. Shadow...
  • Board-level Security Ratings Meets Threat Intelligence (BitSight Acquires AnubisNetworks)

    Network World - Networking Nuggets and Security Snippets
    With the recent avalanche of security breaches including Target, Home Depot, and JP Morgan Chase, cybersecurity companies have become financial darlings from Wall Street to Sand Hill Rd. Investors on both coasts are looking for the next major IPO or acquisition to cash in on the dangerous threat landscape.Along those lines, there was an interesting cybersecurity acquisition announced this morning. Massachusetts-based BitSight, a cybersecurity rating service provider, acquired AnubisNetworks, a threat intelligence firm based in Portugal. Now, it’s likely that the technical analysts in lower Manhattan and the Chardonnay-drinking VCs in Palo Alto will overlook this low-dollar merger, but there is more here than money alone. The combination of BitSight and Anubis has the potential to unite alien populations – business and technology groups. To read this article in full or to leave a comment, please click here
  • Think Before you “Share” to Prevent Identity Theft

    Trend Micro - Cloud Security Blog
    You wouldn’t broadcast your credit card information in the middle of the street, so why would you share other private information publicly on your social media page? The truth is, many people don’t realize how their privacy settings work on social profiles, and because of this many people unintentionally share personal information with the world....
  • Denial-of-service attacks—short but strong

    Symantec Security Response Blogs
    DDoS amplification attacks continue to increase as attackers experiment with new protocols.



    Summary: 


    DDoS amplification attacks continue to increase as attackers experiment with new protocols.




    read more
  • Targeted Attacks: Stealing Information Through Google Drive

    TrendLabs - Malware Blog
    Using cloud-based sharing sites is not a new routine for bad guys. Aside from providing free storage for their malicious files, these legitimate sites are used to evade security vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attacks: Stealing Information Through Google Drive
  • Targeted Attacks: Stealing Information Through Google Drive

    Trend Micro - Security Intelligence
    Using cloud-based sharing sites is not a new routine for bad guys. Aside from providing free storage for their malicious files, these legitimate sites are used to evade security vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attacks: Stealing Information Through Google Drive
  • UK considering imprisoning 'cowardly, venomous trolls' for up to 2 years

    Sophos - Naked Security
    Justice Secretary Chris Grayling said that new laws would quadruple the current maximum six-month term and show his determination to "take a stand against a baying cyber-mob".
  • Apple pushes out iOS 8.1 - kills the mobile POODLE and closes some, ahem, "backdoors"

    Sophos - Naked Security
    The marquee vulnerablity fixed in iOS 8.1 is, as you might expect, POODLE.

    But there are other cryptographic fixes in iOS 8.1 that are equally important...because cryptography is notoriously hard to get right first time.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place