Security News
![New crypto-ransomware encrypts video games files (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
2015-03-12 14:42
A new piece of ransomware that (mis)uses the Cryptolocker "brand" has been analyzed by Bromium researchers, and they discovered that aside from the usual assortment of file types that ransomware usual...
![In Tim Berners-Lee's original proposal for the web, data security and copyright enforcement was listed under Non requirements (Reddit)](/static/build/img/news/alt/managed-security-small.jpg)
![Why CISOs Need a Security Manifesto (SecurityWeek)](/static/build/img/news/alt/managed-security-small.jpg)
![3 Ways to Standardize ERP Business Processes Across Multinational Pharmaceutical Corporations (IT Toolbox Blogs)](/static/build/img/news/alt/crypto-stat-small.jpg)
![Top Trends in Mobility 2015 - From the Mobile World Congress 2015 (IT Toolbox Blogs)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![Circumnavigating the Globe and Learning about Mobility, IoT and Digital Transformation (IT Toolbox Blogs)](/static/build/img/news/alt/IoT-Cybersecurity-Predictions-2-small.jpg)
![Google Fixes Privilege Escalation Vulnerabilities in Android 5.1 Lollipop (SecurityWeek)](/static/build/img/news/alt/cyberattack-stats-small.jpg)
![Study: Enterprises Losing Faith In Digital Certificates, Crytographic Keys (Dark Reading)](/static/build/img/news/alt/managed-security-small.jpg)
![Windows Event Log Driven Scheduled Task Backdoor (Reddit)](/static/build/img/news/alt/crypto-stat-small.jpg)
!["Row hammering" - how to exploit a computer by overworking its memory (Naked Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
2015-03-12 13:55
By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"