Corporate Partners

Top IT Security Bloggers

  • US Attorney General urges tech companies to leave back doors open on gadgets for police

    Sophos - Naked Security
    Don't lock police out of popular consumer gadgets, lest law enforcement's efforts to nab kidnappers or child predators be stymied, the US AG said, becoming the latest of a string of government officials to speak out since Google and Apple announced they were changing encryption on their mobile operating systems.
  • SSCC 166.5 - Special edition from the Virus Bulletin 2014 conference [PODCAST]

    Sophos - Naked Security
    Sophos security expert Chester Wisniewski was at the Virus Bulletin 2014 conference in Seattle.

    In this special edition of the Chet Chat, Paul Ducklin puts Chet on the other side of the mic to find out more about both the technology and the ethics of anti-malware research.
  • Information Security: It’s a Journey

    Trend Micro - Cloud Security Blog
    It is certainly a truism to say that an organisation’s weakest point is its own employees. It could be argued that because this has been said many times by many people, because it offers no new insight then it is of little value to state it again. Such is the nature of a truism. However,...
  • ID Theft Service Customer Gets 27 Months

    Krebs on Security
    A Florida man was sentenced today to 27 months in prison for trying to purchase Social Security numbers and other data from an identity theft service that pulled consumer records from a subsidiary of credit bureau Experian.
  • Investigating Twitter Abuse, Part 2

    TrendLabs - Malware Blog
    In the previous blog post of this series, I introduced our paper that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we’ve seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the United States generally click the most links that go to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroInvestigating Twitter Abuse, Part 2
  • Investigating Twitter Abuse, Part 2

    Trend Micro - Security Intelligence
    In the previous blog post of this series, I introduced our paper that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we’ve seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the United States generally click the most links that go to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroInvestigating Twitter Abuse, Part 2
  • Head of 'StealthGenie' mobile stalking app indicted for selling spyware

    Sophos - Naked Security
    The indictment alleges that StealthGenie can and has recorded all incoming/outgoing voice calls; intercepted calls to be monitored in real time; allowed the buyer to call the phone and activate it at any time to monitor all surrounding conversations within a 15-foot radius; and much more...
  • Palo Alto Endpoint Security Announcement: Proof of a Market in Transition

    Network World - Networking Nuggets and Security Snippets
    Did you see the Palo Alto Networks announcement yesterday? If not, here’s my synopsis. PAN introduced a new endpoint security technology named “Traps” that is the ultimate result of the company’s acquisition of Cyvera this past March. In simple terms, Traps provides three core security functions:
    Advanced malware prevention. Traps is designed to deal with the most important attack vectors such as memory corruption, changes in registry settings, and malware persistency, with no prior knowledge about the malware itself.
    Endpoint forensics. Traps captures system-level activities to help security analyst understand what changes, if any, were made to compromised systems.
    Integration of network and endpoint security. Traps ties into PAN Wildfire and NGFW. This integration provides more holistic protection and gives analysts a vantage point across network and endpoint activities. The integration also ties Traps into Palo Alto threat intelligence.

    A few years ago, the endpoint security market was a cozy little oligopoly that was dominated by five vendors: Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. Others, like CA, Check Point, and even mighty Microsoft, couldn't crack the code and either exited the market or minimized their product development, marketing, and sales. To read this article in full or to leave a comment, please click here
  • October is National Cyber Security Awareness Month

    Trend Micro - Cloud Security Blog
      Welcome to October and National Cyber Security Awareness Month. This is a special month-long awareness program put together by U.S. Department of Homeland Security, the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center. Trend Micro is proud to be an official champion for Cyber Security Awareness Month 2014. As part of this...
  • 3 more essential security tasks you can do for your family today

    Sophos - Naked Security
    Fetch your cape, family tech support hero, you've got work to do!

    Update it, lock it, encrypt it, and keep your nearest and dearest cybersecure.

Market Place