Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number of financial and other institutions that are… Continue reading Why Fileless Malware Will Continue Its Rapid Expansion

Mitigating Cyber-Risks in Everyday Technology Use

The various applications, devices and networks in use across the world have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information from any device with a Wi-Fi connection, and IT consumeri… Continue reading Mitigating Cyber-Risks in Everyday Technology Use

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instru… Continue reading Tech support scam alarms Chrome users

AC/DC Act: Good in Theory, Terrible in Practice

Earlier this month, Georgia Congressman Tom Price introduced H.R. 4036, the Active Cyber Defense Certainty Act (AC/DC Act). The legislation would permit certain “victims” of cyberattacks to engage in certain types of “active defense” or “hack back” free from both civil and criminal liability under the Computer Fraud and Abuse Act. It would also empower..

The post AC/DC Act: Good in Theory, Terrible in Practice appeared first on Security Boulevard.

Continue reading AC/DC Act: Good in Theory, Terrible in Practice

Rules for Security Vendors – Enterprise Security Weekly #33

Nerdio partners with CensorNet, ThreatConnect reveals a new threat intelligence product suite, free cyberthreat hunter, and defender tools for security analysts. Paul and John review the CISO Manifesto and deliver the top 10 rules for security vendors in this week’s episode of Enterprise Security Weekly! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode33 Visit http://securityweekly.com/esw for all the latest Continue reading Rules for Security Vendors – Enterprise Security Weekly #33

2015 Cyberthreat Defense Report Spotlights Changing Security Trends

The CyberEdge Group has released their exhaustive 2015 Cyberthreat Defense Report, jam-packed with insights regarding the latest identified security trends for North America and Europe. The CyberEdge Group bill themselves as “Premier Research and Marketing Services for High-Tech Vendors and Service Providers.” The 41-page PDF report collects data from surveys of over 800 “qualified IT security […]

The post 2015 Cyberthreat Defense Report Spotlights Changing Security Trends appeared first on ThreatTrack Security Labs Blog.

Continue reading 2015 Cyberthreat Defense Report Spotlights Changing Security Trends

2015 Cyberthreat Defense Report Spotlights Changing Security Trends

The CyberEdge Group has released their exhaustive 2015 Cyberthreat Defense Report, jam-packed with insights regarding the latest identified security trends for North America and Europe. The CyberEdge Group bill themselves as “Premier Research and Marketing Services for High-Tech Vendors and Service Providers.” The 41-page PDF report collects data from surveys of over 800 “qualified IT security […]

The post 2015 Cyberthreat Defense Report Spotlights Changing Security Trends appeared first on ThreatTrack Security Labs Blog.

Continue reading 2015 Cyberthreat Defense Report Spotlights Changing Security Trends