Corporate Partners

Top IT Security Bloggers

  • Old-time phishing scams are working just fine, Google finds

    Sophos - Naked Security
    A new Google study has found that the true masterpieces of phishing are successful 45% of the time. It's just another example of how phishers may be old dogs, but they can sure learn new tricks.
  • Countdown to Zero Day—Did Stuxnet escape from Natanz?

    Symantec Security Response Blogs
    Symantec's analysis on the Stuxnet worm features in new Kim Zetter book.


    Today, Kim Zetter released her book, “Countdown to Zero Day”. The book recounts the story of Stuxnet’s attempt to sabotage Iran’s uranium enrichment program. The work that Eric Chien, Nicolas Falliere, and I carried out is featured in the book. During the process of writing the book, Kim interviewed us on many occasions and we were lucky enough to be able to review an advanced copy.
    read more
  • Timeline of Sandworm Attacks

    TrendLabs - Malware Blog
    The Sandworm vulnerability, also known as CVE-2014-4114, is an interesting vulnerability for two reasons. For one, it is related to the timing of the vulnerability life cycle.  In this blog post, we will tackle vulnerability analysis, and user awareness on what actions to take when they are under attack.  Note that all dates and times discussed here […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTimeline of Sandworm Attacks
  • Timeline of Sandworm Attacks

    Trend Micro - Security Intelligence
    The Sandworm vulnerability, also known as CVE-2014-4114, is an interesting vulnerability for two reasons. For one, it is related to the timing of the vulnerability life cycle.  In this blog post, we will tackle vulnerability analysis, and user awareness on what actions to take when they are under attack.  Note that all dates and times discussed here […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTimeline of Sandworm Attacks
  • Apple releases tool to fix vanishing iMessage issue

    Sophos - Naked Security
    Are you an ex-iPhone owner whose iMessages have disappeared into a black hole from whence they never return? If so, Apple now has a fix for that.
  • Cyber Ground Truth

    Trend Micro - Cloud Security Blog
    Ground Truth is a military term that describes the reality of a tactical situation – as opposed to intelligence reports and mission plans. Just as the military cannot solely rely upon the intelligence provided by aerial surveillance nor can enterprises rely solely on threat intelligence. What is ground truth for cyber tactics in 2015? We attempted to...
  • Operation Onymous: 17-nation bust takes out over 400 "hidden services"

    Sophos - Naked Security
    It turns out that last week's bust of Silk Road 2.0's kingpin was just a hint at what was coming: namely, a multinational crackdown on dark-market sites hidden away on the Tor network.
  • Removing Wirelurker from Your iOS or OSX Device

    Trend Micro - Security Intelligence
    In an earlier blog post, we tackled what Wirelurker malware is and its security implications and risks for iOS and OSX devices.  Within hours of the discovery of this malware, a Windows-based malware (detected as TROJ_WIRELURK.A) that performs the same attack was also seen in the wild. In this blog post, we’d like to share practices […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRemoving Wirelurker from Your iOS or OSX Device
  • Removing Wirelurker from Your iOS or OSX Device

    TrendLabs - Malware Blog
    In an earlier blog post, we tackled what Wirelurker malware is and its security implications and risks for iOS and OSX devices.  Within hours of the discovery of this malware, a Windows-based malware (detected as TROJ_WIRELURK.A) that performs the same attack was also seen in the wild. In this blog post, we’d like to share practices […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroRemoving Wirelurker from Your iOS or OSX Device
  • Notes from SophosLabs: On the trail of rootkits and other malware

    Sophos - Naked Security
    When an interesting new piece of malware makes the news, the first question people ask is usually, "How does it work? "

    And that leaves us with the question behind the question: "How do you tell what it does?"

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place