This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticlePresenting Mobile Pwn2Own 2016
After taking a year off to do some paperwork, the Zero Day Initiative (ZDI) invites you to join us for the fifth annual Mobile Pwn2Own competition, to be held this year on October 26 and 27 at the...
View ArticleCyber extortion proves importance of email security
Nefarious individuals have used extortion as a means of making money for as long as crime has existed. However, past schemes generally involved harm to expensive objects or even the victim himself....
View ArticleSurprise surprise, cyber criminals aren’t honest
Cyber crime is a major concern, both for consumers and enterprises alike. The connectivity of the internet has allowed for some pretty incredible innovations, but it's also allowing criminals an...
View ArticleThe deck is stacked against APAC: Lack of cyber security awareness preludes...
Political philosopher, writer and U.S. founding father Thomas Jefferson once stated that, "Education is the great equalizer." When it comes to cyber security, this couldn't be more true. Modern...
View ArticleProtecting Your Enterprise against a New Generation of Cybercriminals
Cybercrime as a Service (CaaS) has been a growing trend throughout Deep Web forums for several years. Inexperienced and, quite frankly, lazy cybercriminals can purchase CaaS tools and services from...
View ArticleNew Trend Micro Ransomware Research Shows Firms Should Wise Up, Not Pay Up
Most IT leaders have by now either encountered ransomware or know someone who has. But how many really understand the threat, its potential impact on the organization and how best to mitigate it? To...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleKeeping the SDDC Security Conversation Going: Life after VMworld 2016
An estimated 23,000 high tech professionals spent last week in Las Vegas listening to the VMware team share their vision for the software defined data center (SDDC) at VMworld 2016. During the keynote...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 5,...
I used to dread the Labor Day holiday in the United States because it signified the end of our summer, my favorite season. It wasn’t until I learned the background behind the holiday that I truly...
View ArticleEnjoy Your Digital Life Safely with Trend Micro Security for 2017
Trend Micro is proud to announce the availability of Trend Micro™ Security for 2017 – our newest release of the industry-leading security software that lets you enjoy your digital life safely. In...
View ArticleAngler: The Rise and Fall of an Exploit Kit
In late 2013, the then-infamous Blackhole Exploit Kit (BHEK) disappeared after the arrest of “Paunch,” its author earlier in October 2013. In March of 2015 we published our report “The Evolution of...
View ArticleThe French Cybercrime Underground Economy
All crime reflects the culture that it happens in. Whether something is even a crime or not depends on the culture of where you are. What is perfectly legal in one country can be a serious crime in...
View ArticleEncryption hides and supports a growing amount of all malware
Strong encryption can be a double-edged sword. It is obviously an essential mechanism for protecting data – e.g., payment card details, passwords, sensitive files, etc. – that is in transit across...
View ArticleBusinesses beware: New open source ransomware threatens the enterprise community
While ransomware is nothing new for the business world, there are never-before-seen infection strains popping up nearly every day. As cybersecurity experts work to bridge the gap between malicious...
View ArticleRansomware is a growing risk on Macs
Ransomware in particular and malware in general have long been seen by consumers, device makers and members of the cyber security community as threats that predominantly target Microsoft Windows-based...
View ArticleBEC Scams – An Exploitation of Trust
Business Email Compromise (BEC) schemes have been growing exponentially since 2013. Since January 2015 alone, according to a June 2016 public service announcement from the FBI Internet Crime Complaint...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...
As I mentioned in a recent blog, TippingPoint celebrated its 15th birthday last month. Occasionally, I get asked if the company was named after the book The Tipping Point by Malcolm Gladwell. While we...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleNew Worry-Free Services Plug-in for LabTech Sets Your Mind at Ease
I’m excited to announce our new Worry-Free Services Plug-In for LabTech. This has been a number of years in the making; and for the first time ever, it is now possible to discover, deploy, and manage...
View Article