A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran. Details about the supposed new attack are superficial at the moment, as there are no details about the supposed attack, the...
A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity — attracting more than 6,300 customers who pay subscription fees to license the software....
Microsoft this week released software updates to fix roughly 50 security problems with various versions of its Windows operating system and related software, including one flaw that is already being exploited and another for which exploit code is publicly available....
Admittedly, most IT professionals would not characterize the threat and consequences of cyberattack as a ‘game’. To most, it is best characterized as a ‘war’. But “that’s not exactly right” writes Martin Barrett in a recent...
Great article for all of us that make difficult decisions on how to invest limited resources available for cybersecurity. To summarize, tech author Giulio D’Agostino writes that the top three priorities should be: 1. Visibility – being able to visualize...
Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes. In the online version of InformationWeek, Lisa Morgan discusses the top 8 cybersecurity mistakes that MANY...
Recent Comments