Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention

Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.

The post Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention appeared first on Security Intelligence.

Continue reading Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention

Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force

The newly launched IBM X-Force Incident Response Services completes the trifecta of actionable threat intelligence from IBM X-Force.

The post Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force appeared first on Security Intelligence.

Continue reading Triple Threat: Engaging a Trifecta of Threat Intelligence From IBM X-Force

Mobile Malware GM Bot v2 Released, Price Triples

The Android malware known as GM Bot has been updated, and this newest version comes packed with exploits ready to deploy on mobile devices.

The post Mobile Malware GM Bot v2 Released, Price Triples appeared first on Security Intelligence.

Continue reading Mobile Malware GM Bot v2 Released, Price Triples

WinRT PDF: A Potential Route for Attacking Edge

Vulnerabilities in the WinRT PDF tool in the new Microsoft Edge browser could allow cybercriminals to carry out expensive exploits.

The post WinRT PDF: A Potential Route for Attacking Edge appeared first on Security Intelligence.

Continue reading WinRT PDF: A Potential Route for Attacking Edge