Security News > 2015 > May

Information Security has become top of mind for companies and this conference is a must for IT staff, CISOs, Board members and CEOs. The Seventh Annual Information Security Summit offers comprehens...

Yet another type of ransomware has been detected by malware researchers. Dubbed AlphaCrypt, it appropriates the look of TeslaCrypt, but operates similarly to Cryptowall 3.0. "While this may look ...

Cybercriminals are using the Angler exploit kit to infect users with the Bedep Trojan, which then uses their computer resources to perform click-fraud and artificially inflate video views.

Engineers at Netflix have released another one of the company’s bespoke security tools as an open-source application, this time an incident-response system known as FIDO. The tool is designed to...

A coder that goes by the online handle "Hephaestos" has shared with the world a Python script that, when put on an USB thumb drive, turns the device in an effective kill switch for the computer in whi...

Cisco researchers have discovered a new information-stealing Trojan that reads and records any plain-text data the victim types into their browser. But this discovery would be nothing to write home ab...

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends happening in enterprise IT today. T...

The APWG reports that during the 4th quarter of 2014, a record number of crimeware variants were detected, a strategy of overwhelming proliferation of variations designed to defeat antivirus software.

The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing slightly, according to SANS. "...

Experian Data Breach Resolution and the Ponemon Institute asked professionals to weigh in on several topics including who should be responsible for securing payment systems and how effective their org...