Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
US/North America News Reporter, Infosecurity Magazine
Targeting Russian banks, it shows advanced capabilities like keylogging, spying, smartcard reading etc.
The scan appeared on a site with suspected ties to Russia, DCLeaks.com.
The revelation set tongues wagging across the financial and security worlds.
It’s been a few weeks coming and the breach is larger than expected.
The breaches impacting the global 1,000 companies the most were heists at LinkedIn and Adobe.
More than half (53%) of global IT professionals confuse “erasing” data with “deleting” data.
How to best enable information-trading is open to debate, with most distrusting public forums.
The 15-point set of federal safety assessment guidelines covers cybersecurity and privacy, with officials vowing recalls if necessary.
A new tool identifies the most popular, legal file-shares and downloads on the web—and then packages them with malware.
ISF defines a structured, methodical process for determining the approaches required to protect mission-critical information assets.
Fresh from the ashes of the Neutrino exploit kit campaign takedown, RIG EK has risen to take over its market share.
The ecosystem remains woefully insecure due to users’ failure to follow best practices.
More than half of the workforce at about half of all companies in business are using cloud applications, like Dropbox or Salesforce.
Webroot's move with Cyberflow Analytics boosts the company’s machine learning capabilities to the network layer, to address IoT, etc.
The Russian APT group leaked medical data stolen from the World Anti-Doping Agency (WADA) for Nadal, Rose, Farah and others.