This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleImpact Team to Ashley Madison – Shut down or Else!
Brian Krebs reports that Ashley Madison, a self-proclaimed site for extra-marital affairs, has been successfully breached. The attackers, a group calling themselves the “Impact Team,” claim they’ve...
View ArticleBuilt for the Cloud: Deep Security Now Available on the Azure Marketplace
All over the world, businesses are embracing cloud computing. From operational efficiency and greater business agility, to cost savings and even green IT gains, the benefits are well-known. Microsoft...
View ArticleCatch Me If You Can: How APT Actors Are Moving Through Your Environment...
Companies that have experienced data breaches often wonder the same thing—“How were the hackers able to move through my environment for that long without being detected?” The average amount of dwell...
View ArticleHR could play leading part in BYOD success
It's a trying time to be an IT director tasked with navigating a company's move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE...
View ArticleWorkforce mobilization becoming the new normal in healthcare
Although security is always a concern within healthcare organizations, many are opting into BYOD (Bring your own Device) programs to take advantage of several undeniable productivity and efficiency...
View ArticleAttention to application security in BYOD boosts productivity, safety
The incorporation of mobile applications and adoption of a BYOD (Bring your own Device) policy likely means that organizations will see a notable rise in employee productivity levels. A report from...
View ArticleMedical offices using mobile need security policies
Healthcare, as with any other industry, is starting to see an influx of mobile devices in the workplace. TechTarget's James Brady wrote that these devices have emerged as one of the top drivers for...
View ArticleAndroid lends a hand to mobile device managers
Android hasn't been getting the most positive press as of late, as there have been heightened complaints of malware versus other operating systems, but the company may soon be winning the favor of IT...
View ArticleRussian cybercriminals turn Android malware into an industry
Google's Android mobile operating system has been a favored target of ambitious cybercriminals and a common conduit for malware distribution. The attacks on it are becoming more syndicated and...
View ArticleIs biometrics-based authentication a silver bullet for mobile security?
Apple’s recently released iPhone 5S has brought biometrics-based authentication into the mainstream. One of the new high-end smartphone’s distinctive features is its Touch ID fingerprint scanner...
View ArticleMobile banking apps must be made more secure
How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...
View ArticleKeeping Mobile Malware at Bay
There’s a lot of airtime devoted to all the different malicious threats that attack computers, but not as much attention is paid to mobile malware. That is starting to change, however, as mobile...
View ArticleConsumers concerned about privacy of data in the Internet of Everything
The Internet of Things – sometimes called the Internet of Everything – was over the horizon for a long time, but now it is finally coming into view as IP connectivity is extended to a large number and...
View ArticleWeb browsers remain gateways for malware
Web browsers became widely used from the mid 1990s onward, following the early success of Netscape Navigator and the subsequent rise of Microsoft Internet Explorer as the default option on millions of...
View ArticleTax season security threats: TorrentLocker
Tax season brings different meanings for different groups of people. For employers, this is the time of year when they need to ensure that tax information for their staff is in order and that they...
View ArticleCyber security: The cooperation game
Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...
View ArticleWhat lies beneath: The deep web and future crimes
The Internet is like an iceberg: There's the part that's visible, and then there's the rest. When we use the Internet, we regard it as a vast, limitless expanse of data. And yet the Internet that we're...
View ArticleBYOD security: Dealing with targeted attacks and zombie apps on mobile
Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their...
View ArticleHow to deal with fake websites
Fake websites have long been a thorn in the side of both consumers and enterprises. The problem has become significant enough for some desktop Web browser makers, including Google and Apple, to...
View Article