Mobile beasts and where to find them — part two
Credit to Author: Leonid Grustniy| Date: Fri, 03 Aug 2018 09:10:01 +0000
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Leonid Grustniy| Date: Fri, 03 Aug 2018 09:10:01 +0000
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
Read More
Credit to Author: Issie Lapowsky| Date: Thu, 02 Aug 2018 15:05:27 +0000
The Democratic National Committee will award $500 to the child who comes up with the best defensive strategy for state election websites at Def Con next week.
Read More
Credit to Author: Brian Barrett| Date: Wed, 01 Aug 2018 22:06:13 +0000
The Justice Department announced the arrest of three members of notorious cybercrime group Fin7—and detailed some of their methods in the process.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 01 Aug 2018 20:38:35 +0000
The tech community has known about the risk of using SMS in two-factor authentication for years. Reddit appears to have missed the memo.
Read MoreCredit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 02 Aug 2018 17:30:09 +0000

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker activity. If and when these signatures or processes are detected, the antivirus program…
The post A Look at Scan4You and the Counter Antivirus Service Landscape appeared first on .
Read MoreCredit to Author: Leonid Grustniy| Date: Thu, 02 Aug 2018 14:47:18 +0000
More than 400 manufacturing companies became phishing targets.
Read MoreCredit to Author: Nikolay Pankov| Date: Thu, 02 Aug 2018 11:54:32 +0000
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Read MoreCredit to Author: Brook Stein, Product Management Director| Date: Thu, 02 Aug 2018 13:00:35 +0000

As mentioned in Phishing Part 1: On the Lookout, phishing attacks have been around for years, but today’s cybercriminals are adept at using them in an ever-increasing variety of ways to get what they want. According to the most recent FBI figures, phishing and its variants was the third most popular cybercrime type in 2017,…
The post Phishing, Part 2: Staying Safe appeared first on .
Read More