February 24, 2016 Innovative Cybersecurity Startups Boosted by New, Big-League Investment Group 2 min read - A new company, Strategic Cyber Ventures, hopes to bolster cybersecurity startups with the funding and resources they need to innovate and succeed.
February 23, 2016 Embracing Intelligence-Driven Fraud Protection and Life Cycle Management 2 min read - The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud prevention so organizations can remain secure at low cost.
February 23, 2016 Announcing the Launch of the AppConfig Community 3 min read - Leading EMM providers IBM, MobileIron, JAMF Software and VMware have come together, working on a common approach for mobile app config and security.
February 22, 2016 Researchers Find VoIP Phones Vulnerable to Simple Cyberattacks 2 min read - Security researchers recently discovered a possible vulnerability in voice-over-IP (VoIP) phones that could put users at risk.
February 19, 2016 Taking the Bait: Leaked Data Grabs Attackers’ Attention 2 min read - A recent study highlighted how quickly cybercriminals go after leaked data as well as what they do with that information after it's been compromised.
February 18, 2016 Mitigating the Buffer Overflow Flaw in Glibc 3 min read - The GNU C Library (glibc) is vulnerable to a stack-based buffer overflow issue. Learn more about the problem and how to avoid, patch and mitigate it.
February 18, 2016 Locky Ransomware: Cute Name, Ugly Consequences? 2 min read - A new ransomware called Locky is the latest macro malware to attack unsuspecting users in an attempt to encrypt files and extort money.
February 17, 2016 IBM and F5 Announce Partnership to Advance the Mobile Enterprise 2 min read - Businesses searching for a way to securely allow access to mobile enterprise apps can now turn to a new solution that combines EMM and APM technologies.
February 16, 2016 Lockdroid Ransomware Fails Thanks to Google’s Verify Apps 2 min read - At a recent security conference, Google claimed its Verify Apps feature prevented Android users from becoming infected with the Lockdroid ransomware.
February 15, 2016 Cybercrime Doesn’t Pay as Much as Previously Thought, Report Shows 2 min read - A new report from the Ponemon Institute and Palo Alto Networks found that cybercrime isn't as lucrative as it was assumed to be.