An IoT Love Story: Always Apart, Never Disconnected

Connected devices are beginning to change ownership for the first time, which presents new IoT security challenges for manufacturers.

The post An IoT Love Story: Always Apart, Never Disconnected appeared first on Security Intelligence.

Continue reading An IoT Love Story: Always Apart, Never Disconnected

The Full Shamoon: How the Devastating Malware Was Inserted Into Networks

X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.

The post The Full Shamoon: How the Devastating Malware Was Inserted Into Networks appeared first on Security Intelligence.

Continue reading The Full Shamoon: How the Devastating Malware Was Inserted Into Networks

X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity

IBM’s X-Force Red team delivers the offensive security capabilities organizations need to protect against and respond to advanced targeted attacks.

The post X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity appeared first on Security Intelligence.

Continue reading X-Force Red Launches in Latin America and Takes on the Evolution of Cybersecurity

Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9

The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9’s kernel, putting application data at risk.

The post Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9 appeared first on Security Intelligence.

Continue reading Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9

Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

A recent IBM X-Force report found that attacks against industrial control systems (ICS) increased significantly in 2016 over last year’s numbers.

The post Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent appeared first on Security Intelligence.

Continue reading Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent

Attackers Targeting Retail Are Shopping for Low-Hanging Fruit

A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.

The post Attackers Targeting Retail Are Shopping for Low-Hanging Fruit appeared first on Security Intelligence.

Continue reading Attackers Targeting Retail Are Shopping for Low-Hanging Fruit

Year in Review: Top Three Cybercrime Threats of 2016

The top three cybercrime threats of 2016 shed some light on what happened in the past 12 months — and what to expect in the year ahead.

The post Year in Review: Top Three Cybercrime Threats of 2016 appeared first on Security Intelligence.

Continue reading Year in Review: Top Three Cybercrime Threats of 2016

Hacked for the Holidays: When You’re Asked to Fix the Family Computer

If you’re an IT professional, you’ll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.

The post Hacked for the Holidays: When You’re Asked to Fix the Family Computer appeared first on Security Intelligence.

Continue reading Hacked for the Holidays: When You’re Asked to Fix the Family Computer

Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

IBM added a Collections feature to its X-Force Exchange that enables researchers to share reports and engage in collaborative defense.

The post Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence appeared first on Security Intelligence.

Continue reading Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

Ransomware Report: Top Security Threat Expected to Continue Rising in 2017

To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.

The post Ransomware Report: Top Security Threat Expected to Continue Rising in 2017 appeared first on Security Intelligence.

Continue reading Ransomware Report: Top Security Threat Expected to Continue Rising in 2017