What modern cyber attacks actually look like
Credit to Author: Trend Micro| Date: Mon, 20 Mar 2017 21:59:38 +0000
Let’s take a closer look at what cyber threats could impact your business and how to protect yourself against them.
RSS Reader for Computer Security Articles
Credit to Author: Trend Micro| Date: Mon, 20 Mar 2017 21:59:38 +0000
Let’s take a closer look at what cyber threats could impact your business and how to protect yourself against them.
Credit to Author: Trend Micro| Date: Mon, 20 Mar 2017 21:48:09 +0000
Are your IT security initiatives manned by an experienced Chief Information Security Officer or led by a supervisor who has little to no cyber security experience? That’s a problem.
Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Sat, 18 Mar 2017 02:59:00 +0000
Our final day of Pwn2Own 2017 came to a close with some amazing research. The contest had never previously required a 3rd day of competition, but with our largest ever number of registrations, coinciding with our 10th anniversary, extending to include the extra entries proved more than worthwhile. Just today, we awarded $250,000 and 54…
Read MoreCredit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Sat, 18 Mar 2017 00:57:57 +0000
Social media is a tough place for companies. That’s understandable. The idea of connecting people to each other breaks down when one of those people is a major multi-national brand. But there is a place on social for companies and when it’s handled well, it’s amazing. Unfortunately, as much as positive examples show personality and…
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 17 Mar 2017 12:00:04 +0000
There was never any doubt what my topic would be for this week’s blog. March Madness, right? Normally I’d be talking about the NCAA Basketball tournament, but not this time. Our March Madness is called Pwn2Own. We celebrated the 10th anniversary of Pwn2Own in Vancouver this week with the biggest contest ever with 11 teams…
Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Fri, 17 Mar 2017 08:42:52 +0000
The second day of competition in this year’s Pwn2Own closed out with a record 17 entries for a single day. In fact, due to the significant number of contestants registered for the 10th anniversary edition of Pwn2Own, we divided the second day into two different tracks: Track A focus on Adobe and Microsoft products while…
Read MoreCredit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Fri, 17 Mar 2017 00:07:09 +0000
The third and final day of the largest Pwn2Own shapes up with four entries and the awarding of Master of Pwn. It’s a tight race with multiple teams still in the running. Here’s the schedule for Day Three: 9:00am – 360 Security (@mj011sec) targeting Microsoft Edge with a SYSTEM-level escalation and a virtual machine escape…
Read MoreCredit to Author: Trend Micro| Date: Thu, 16 Mar 2017 17:47:43 +0000
Machine learning is being applied to five new areas with high hopes that it can catch threats before they result in major cyber security incidents.