Top IT Security Bloggers

Symantec Security Response Blogs
  • Android.Lockscreen ransomware now using pseudorandom numbers

    Symantec Security Response Blogs
    The latest Android.Lockscreen variants are using new techniques to improve their chances of obtaining ransom money.






    Twitter Card Style: 
    summary_large_image


    New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom.
    read more
  • Scammers spoof TaiG, offer fake iOS jailbreak

    Symantec Security Response Blogs
    Scammers are spoofing the popular TaiG jailbreaking site to offer a fake iOS 9.2.1 jailbreak tool that leads to a donation page.






    Twitter Card Style: 
    summary


    With each new iOS release, a large number of users wait eagerly for the corresponding and inevitable jailbreak solution. Although jailbreaking compromises the security of the device, users resort to it because it allows them to install a wider variety of apps—including those that are not vetted by Apple—and often uses restricted API
    read more
  • Five ways Android malware is becoming more resilient

    Symantec Security Response Blogs
    Newly observed techniques used by Android malware authors attempt to make things more difficult for victims and security products.






    Twitter Card Style: 
    summary


    Contributors: Tommy Dong, Martin Zhang
    Recently, a number of new techniques have been discovered that not only help Android malware evade detection but also help it stay installed even when detection has taken place. We are seeing these techniques incorporated across a large swath of malware families. In this blog post, we’ll do a quick round up of these techniques.
    read more
  • IoT devices being increasingly used for DDoS attacks

    Symantec Security Response Blogs
    Malware is infesting a growing number of IoT devices, but their owners may be completely unaware of it.






    Twitter Card Style: 
    summary


    Malware targeting the Internet of Things (IoT) has come of age and the number of attack groups focusing on IoT has multiplied over the past year. 2015 was a record year for IoT attacks, with eight new malware families emerging. More than half of all IoT attacks originate from China and the US.
    read more
  • Microsoft Patch Tuesday – September 2016

    Symantec Security Response Blogs
    This month the vendor released 13 bulletins, six of which are rated Critical.






    Twitter Card Style: 
    summary



    Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor released 13 bulletins, six of which are rated Critical.
    As always, customers are advised to follow these security best practices:
    read more
  • Latest Intelligence for August 2016

    Symantec Security Response Blogs
    Our Latest Intelligence reveals that the number of new malware variants hit 45.5 million in August, the highest level seen since last year.






    Twitter Card Style: 
    summary


    The Latest Intelligence page has been refreshed through August 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Here are some key takeaways from this latest batch of intelligence.
    read more
  • Buckeye cyberespionage group shifts gaze from US to Hong Kong

    Symantec Security Response Blogs
    Several organizations in Hong Kong are being targeted by a cyberespionage group known as Buckeye.






    Twitter Card Style: 
    summary


    Buckeye (also known as APT3, Gothic Panda, UPS Team, and TG-0110) is a cyberespionage group that is believed to have been operating for well over half a decade. Traditionally, the group attacked organizations in the US as well as other targets. However, Buckeye’s focus appears to have changed as of June 2015, when the group began compromising political entities in Hong Kong.
    read more
  • Trident: Trio of iOS zero-days being exploited in the wild

    Symantec Security Response Blogs
    Users of iPhones and other iOS devices are advised to upgrade to the latest version of the operating system.






    Twitter Card Style: 
    summary


    Three zero-day vulnerabilities in Apple’s iOS mobile operating system are being exploited in the wild in targeted attacks. The vulnerabilities, collectively dubbed “Trident”, can be exploited by attackers to remotely jailbreak Apple iOS devices and install malware.
    read more
  • Non-existent video involving Hillary Clinton and ISIS leader used as bait in malicious spam

    Symantec Security Response Blogs
    Malicious attachment contains Adwind cross-platform remote access Trojan.






    Twitter Card Style: 
    summary


    Contributors: Paul Mangan, Kevin Savage
    Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging money with an ISIS leader, in order to distribute malicious spam emails.
    read more
  • Equation: Has secretive cyberespionage group been breached?

    Symantec Security Response Blogs
    A new attack group has released a data dump of leaked exploits and hacking tools they claim belong to the Equation group.






    Twitter Card Style: 
    summary


    An attack group calling itself the Shadow Brokers has released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools they state were used by Equation.
    read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place