November 23, 2016 Relax and Shop, We’re Keeping Watch 2 min read - The IBM X-Force Threat Research team is keeping watch on all things retail during the upcoming Black Friday through Cyber Monday shopping weekend.
November 22, 2016 Locky Ransomware Spread Via Facebook Messenger 2 min read - Security researcher Bart Blaze discovered that cybercriminals have been spreading Locky ransomware using the Facebook Messenger app.
November 22, 2016 IBM Named Leader in IDC MarketScape: Asia-Pacific Managed Security Services 2016 Vendor Assessment 3 min read - The IDC MarketScape: Asia-Pacific Managed Security Services 2016 Vendor Assessment named IBM a leader among managed security services (MSS) providers.
November 21, 2016 Browsers to End SHA-1 Support in 2017 2 min read - Some of the biggest names in the web browser game — namely, Google, Microsoft and Mozilla — plan to stop accepting insecure SHA-1 certificates in 2017.
November 17, 2016 RIG-E Exploit Kit Delivers New CryptoLuck Ransomware 2 min read - The recently discovered CryptoLuck ransomware is distributed by the RIG-E exploit kit, suggesting that it may target a large pool of victims.
November 17, 2016 The Evolution of IBM X-Force 2 min read - Previously, the sole focus of the IBM X-Force team was to monitor threats to better secure IBM projects. Today the group is dedicated to pure research.
November 17, 2016 Uninvited Guest? Carbanak Malware Hacks Hospitality Market 2 min read - The Carbanak gang redesigned its flagship malware to target restaurants and hotels by tricking call center agents into clicking malicious email links.
November 15, 2016 Researchers Try to Create Malware Chip 2 min read - The NSF is sponsoring an attempt to build a malware chip capable of detecting anomalies in system processes and alerting local security software.
November 15, 2016 WindTalker: Breezy Burglars Steal Passwords With Wi-Fi Dupe 2 min read - The WindTalker exploit enables fraudsters to deduce smartphone passwords and PINs over public Wi-Fi by analyzing changes in CSI.
November 15, 2016 Privileged Identity Management for the Extended Enterprise 2 min read - IT professionals are adopting privileged identity management solutions to monitor third-party access without sacrificing speed or ease of use.