April 28, 2016 Infection Minus Interaction? New Android Ransomware Delivers 2 min read - A researcher at Blue Coat Labs observed a new Android ransomware that is able to install itself on user devices without user interaction.
April 27, 2016 IBM Unveils Enhancements to Its Mobile Productivity Tools and Data Protection Controls 3 min read - MaaS360's latest enhancements include a major redesign of the user experience and tighter integration with security tools for greater mobile productivity.
April 26, 2016 Security Researcher Bypasses Windows AppLocker 2 min read - Security researcher Casey Smith explained how he was able to bypass Windows AppLocker, one of the primary tools that enforces security in Windows.
April 26, 2016 Just in Time for Summer, MIT Slaps Down New Bug Bounty Program 2 min read - MIT a new has just introduced a new bug bounty program — with a few unique wrinkles. It's only open to the school community and doesn't pay out cash.
April 21, 2016 OS X Roundup: The Good, the Bad and the Ugly 2 min read - There has been a lot of news regarding OS X recently, and it runs the gamut from solid security progress to more alarming vulnerabilities.
April 21, 2016 JIGSAW Takes Crypto-Ransomware in Deadly Directions 2 min read - The crypto-ransomware JIGSAW, which encrypts and then deletes files from machines, uses scenes from the movie "Saw" to scare its victims to pay up.
April 21, 2016 Security Awareness Training: ‘Good Enough’ Won’t Keep Phish off the Hook 2 min read - A recent study indicated U.K. companies are not investing enough into security awareness training and expose themselves to phishing attacks as a result.
April 20, 2016 2015 Security Software Market Share Rankings 2 min read - Gartner recently reported its market share numbers for security software worldwide for the 2015 calendar year, and IBM had an impressive showing.
April 19, 2016 Ransomware Attacks Use JBoss Servers to Spread 2 min read - Samsam ransomware attacks are being carried out so successfully thanks to the malware's sophisticated ability to spread via compromised servers.
April 18, 2016 Cloud Complications: Short URLs Come With Big Problems 2 min read - Short URLs were created to help users have an easier and smoother experience, but cybercriminals can benefit from the concept, as well.