September 19, 2016 New Google API Will Securely Verify Chrome Devices 2 min read - The new Google API allows a network service to obtain a hardware-backed cryptographic guarantee of the identities of a device and the user accessing it.
September 16, 2016 Windows Trojan Spreads to Android and iOS Devices Via USB 2 min read - Windows Trojan DualToy, which had previously infected Windows PCs exclusively, branched out to attack Android and iOS devices connected to PCs via USB.
September 15, 2016 Misconfigured NTP Servers Serve as a DDoS Resource 2 min read - A quarterly report from Akamai found that attackers are increasingly leveraging misconfigured NTP servers to launch DDoS attacks.
September 13, 2016 Portable Problems? New Vulnerability Report Sparks Hacker Hunt 2 min read - A vulnerability report is designed to alert vendors of potential security issues, but it can also help cybercriminals identify weak spots to attack.
September 13, 2016 CryLocker Tries to Hide Its Loot 2 min read - The CryLocker malware family's novel approach to file management makes it difficult for victims to recover their data, even if they pay a ransom.
September 12, 2016 Things IBM BigFix Can Do for Your Endpoint Security (That You Didn’t Know About) < 1 min read - Respected security leader Jason Cordell offered high praise for IBM BigFix in his ongoing blog series, writing that it "makes ... work very simple."
September 8, 2016 Crypto Keys Conundrum: For InfoSec, Sharing Isn’t Caring 2 min read - SEC Consult found that sharing of nonunique crypto keys is up 40 percent over the last nine months, putting 4.5 million devices at risk.
September 8, 2016 Telnet Ports Subject to Botnets Using Brute-Force 2 min read - Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
September 8, 2016 Point-of-Sale Data Breach Goes to the Cloud 2 min read - During a recent point-of-sale data breach, attackers made off with client data regarding products, sales, passwords and electronic signatures.
September 7, 2016 Antivirus Aggravation: False Positive Detection Delivers Negative Outcome for Windows Users 2 min read - Excessive false positive detection can impair users' ability to perform basic functions or administrative actions, producing results akin to an attack.