Security » Features »

  • At Black Hat: A free tool for spear phishing Twitter

    A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX.
    Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it.

    22 July 16 08:04 Written by Tim Greene
  • Cisco patches critical exposure in management software

    Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.

    21 July 16 05:16 Written by Michael Cooney
  • Carbon Black buys Confer for next-gen anti-virus

    Carbon Black has bought Confer to boost its protection for network endpoints using a behavioral form of antivirus combined with cloud analysis of threats rather than traditional signature-based software.

    20 July 16 03:08 Written by Tim Greene
  • Wearables could compromise corporate data

    Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say.

    15 July 16 20:00 Written by Matt Hamblen
  • Bugs & Bugs: As in, the software kind -- and insects

    Bugs & Bugs: Gypsy Moth invasion, cyborg locusts, Zero Days -- the movie, bug problems for Lenovo, Symantec & others, and super interesting research from New York University & others aimed at reducing software bugs

    11 July 16 07:29 Written by Bob Brown
  • Gartner’s top 10 security predictions

    Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each.

    23 June 16 23:26 Written by Tim Greene
  • 4 big plans to fix internet security

    Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

    13 May 16 20:00 Written by Fahmida Y. Rashid
  • ​Spying smart toys – How to protect your kids from exposure online

    In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and stuffed animals for tablets and mobile devices. Children are so attracted to having games and electronic devices to play with, they unwittingly give over their personal details without a second thought. Children are now so au fait with technology that it’s not unusual for children under the age of 4 to play with their tablets, mobile devices and watching TV right before bed.

    11 May 16 13:39 Written by Alexandra Gheorghe

Market Place