Corporate Partners

Top IT Security Bloggers

  • Google discloses security vulnerabilities in OS X – while leaving a billion Android users exposed

    Graham Cluley
    Most of us have heard the saying “People in glass houses shouldn’t throw stones”, but not Google it seems.
    Read more in my article on the Intego Mac Security blog.
  • Over a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks

    TrendLabs - Malware Blog
    Our engineers were investigating a case involving a targeted attack when they came across a custom tool called vtask.exe. Once executed, vtask.exe hides Windows tasks in the current session. What’s curious about this attacker-created tool is that it appears to have been compiled in 2002—twelve years ago. A Look at Vtask The compiler time shows […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOver a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks
  • Over a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks

    Trend Micro - Security Intelligence
    Our engineers were investigating a case involving a targeted attack when they came across a custom tool called vtask.exe. Once executed, vtask.exe hides Windows tasks in the current session. What’s curious about this attacker-created tool is that it appears to have been compiled in 2002—twelve years ago. A Look at Vtask The compiler time shows […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOver a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks
  • Beyond "fake invoice" scams - crooks can get money out of real invoices, too!

    Sophos - Naked Security
    If I told you to change your record of a supplier's bank account so I got all the payments, would you do so?

    1000s of companies did, and didn't spot the misdirected payments until an average of $100,000 had gone west...
  • Spreading the Disease and Selling the Cure

    Krebs on Security
    When Karim Rattani isn’t manning the till at the local Subway franchise in his adopted hometown of Cartersville, Ga., he’s usually tinkering with code. The 21-year-old Pakistani native is the lead programmer for two very different yet complementary online services: One lets people launch powerful attacks that can knock Web sites, businesses and other targets offline for hours at a time; the other is a Web hosting service designed to help companies weather such assaults.
  • Enterprise Organizations are Replacing Commercial Antivirus with Freeware

    Network World - Networking Nuggets and Security Snippets
    For the past 15 to 20 years, the vast majority of organizations install commercial antivirus software on just about every PC residing on their networks.  This resulted in a multi-billion dollar industry dominated by five vendors:  Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro.  AV security efficacy has come into question over the past few years however, as cyber-criminals and State-sponsored hackers regularly used customized malware and zero-day attacks to circumvent AV and compromise PCs. Given the limitations of traditional AV, some organizations are adding new endpoint anti-malware tools from vendors such as Bit9, Bromium, Cisco, Confer, Cylance, CrowdStrike, FireEye, IBM, Malwarebytes, Palo Alto Networks and Triumfant.  Others are implementing endpoint forensic capture/analysis tools (i.e. Guidance Software, RSA, SentinelOne, Viewfinity) to gain a better understanding of endpoint activity and anomalous behavior.To read this article in full or to leave a comment, please click here
  • Lizard Squad moves on from Xbox and PlayStation, hacks Malaysia Airlines

    Sophos - Naked Security
    The Malaysia Airlines website was defaced by hackers claiming to represent Lizard Squad and the 'Cyber Caliphate'.
  • Sponsor: AV-Comparatives

    Graham Cluley
    Graham Cluley Security News is this week sponsored by AV-Comparatives.
    AV-Comparatives is an independent organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises.
    Using one of the largest sample collections worldwide, it creates a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organizations and scientific institutions.

    Certification by AV-Comparatives provides an official seal of approval for software performance which is globally recognized.
    Currently, AV-Comparatives’ Real-World Protection Test is the most comprehensive and complex test available when it comes to evaluating the real-life protection capabilities of antivirus software. Put simply, the test framework replicates the scenario of an everyday user in an everyday online environment – the typical situation that most of us experience when using a computer with an internet connection.
    AV-Comparatives works closely with several academic institutions, especially the University of Innsbruck’s Department of Computer Science, to provide scientific testing methods.
    Find out more, and download the latest test results, on the AV-Comparatives website.

    If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Monday review - the hot 25 stories of the week

    Sophos - Naked Security
    Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
  • Analyzing CVE-2015-0311: Flash Zero Day Vulnerability

    Trend Micro - Security Intelligence
    Last week a major zero-day vulnerability was found in Adobe Flash Player. Over the weekend, Adobe released an update to fix the vulnerability: users who have enabled auto-update already received the newest version (16.0.0.296). Our analysis has confirmed that the vulnerable code has been modified. The update will be available for manual download later this week. Users of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAnalyzing CVE-2015-0311: Flash Zero Day Vulnerability

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place