Top IT Security Bloggers

  • DressCode and its Potential Impact for Enterprises

    Trend Micro - Security Intelligence
    Threats to mobile users have grown quickly in the span of only a few months. Trend Micro’s Mobile App Reputation Service (MARS) has counted 16.6 million malware detections as of August 2016, a 40% leap from detections listed in January. The Android platform continues to be particularly susceptible, with one specific malware family called "DressCode" steadily and stealthily spreading since April before reports about it surfaced in August. This malware gives attackers an avenue into internal networks which compromised devices are connected to—a notable risk if the device is used to connect to company networks.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    DressCode and its Potential Impact for Enterprises
  • DressCode and its Potential Impact for Enterprises

    TrendLabs - Malware Blog
    Threats to mobile users have grown quickly in the span of only a few months. Trend Micro’s Mobile App Reputation Service (MARS) has counted 16.6 million malware detections as of August 2016, a 40% leap from detections listed in January. The Android platform continues to be particularly susceptible, with one specific malware family called "DressCode" steadily and stealthily spreading since April before reports about it surfaced in August. This malware gives attackers an avenue into internal networks which compromised devices are connected to—a notable risk if the device is used to connect to company networks.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    DressCode and its Potential Impact for Enterprises
  • ‘Money Mule’ Gangs Turn to Bitcoin ATMs

    Krebs on Security
    Fraudsters who hack corporate bank accounts typically launder stolen funds by making deposits from the hacked company into accounts owned by "money mules," willing or unwitting dupes recruited through work-at-home job scams. The mules usually are then asked to withdraw the funds in cash and wire the money to the scammers. Increasingly, however, the mules are being instructed to remit the stolen money via Bitcoin ATMs.
  • Think changing your Yahoo password is enough? Think again…

    Trend Micro - Cloud Security Blog
    With the recent announcement of more than 500 million accounts impacted by a security breach, many Yahoo users have been changing their passwords. After all, that’s the official guidance. However, as ZDI’s Simon Zuckerbraun points out, a new password isn’t enough. If you have a Yahoo account, chances are you’ve seen a notification that your account...
  • Russian hackers likely targeted journalists investigating Flight MH17

    Graham Cluley
    When investigative journalists reporting on the shooting down of Malaysia Airlines flight MH17 in eastern Ukraine are targeted by hackers, it doesn't take long before conclusions are made as to who might be responsible.
    David Bisson reports.
  • FBI probes possible hacks targeting phones of Democratic Party staff

    Sophos - Naked Security
    Agents have reportedly asked to image some Democratic staffers' phones as they search for evidence - such as malware - of the hacking.
  • Why a massive DDoS attack on a blogger has internet experts worried

    Sophos - Naked Security
    The apparent ease with which the massive attack was summoned has some experts concerned.
  • SMS spammer cops big fine for close to 8 million text message spams

    Sophos - Naked Security
    "Indirect, or third-party, consent can be valid but only if it is clear and specific enough." These guys weren't.
  • How to Protect Yourself Against Ransomware – Part 1

    Trend Micro - Cloud Security Blog
    Get Smart. Get Protected The pernicious rise of ransomware is a frightening prospect for everyday users and companies alike. By the end of 2015, Trend Micro predicted 2016 would become the Year of Online Extortion—and unfortunately, that prediction has proved true. In the first half of 2016 alone, a total of 79 new ransomware families were...
  • Major bank attacks thwarted by SWIFT thinking

    Sophos - Naked Security
    Remember last March's online $81 million Bangladesh Bank heist? Turns out there have been several more attacks since then.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place