October 7, 2015 Research Shows How a Webmail Server Like OWA Could Offer an Opening to Cybercriminals 2 min read - A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.
October 7, 2015 Nuclear Facilities Not Ready for Cyberattacks: What’s the Fallout? 3 min read - According to a new Chatham House report, nuclear facilities aren't ready for cyberattacks. What's the possible fallout facing this industry?
October 6, 2015 Common Vulnerabilities: The Key to Better Cybersecurity? 2 min read - A new report finds companies share common cybersecurity vulnerabilities. Can this common ground be used to enhance network security?
October 6, 2015 Scottrade Security Breach Could Spawn Stock Scams Targeting 4.6 Million Customers 2 min read - If you hear from Scottrade in the next few days, it may be about a security breach involving an estimated 4.6 million customers.
October 6, 2015 Linux.Wifatch: The Router Virus That May Be Secretly Defending You From Other Malware 2 min read - A hacker may be helping protect unsuspecting users from malware through the Linux.Wifatch router virus, which protects home networks from botnets.
October 5, 2015 From the Grave: Adobe Exploit Rises Again 2 min read - An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
October 1, 2015 Bad Words: Curse of Macro Malware Makes a Comeback 2 min read - Macro malware is making a comeback in the form of malicious email attachments. How do companies avoid the curse of bad Word docs?
October 1, 2015 Experts Say Apple Just Raised the Bar With Its Revamped Privacy Policy 2 min read - Apple's new privacy policy offers a number of interesting details and suggestions regarding how it plans to protect private customer data.
October 1, 2015 Want a Better Windows Encrypt? Take a Pass on TrueCrypt 2 min read - Looking for the best way to encrypt Windows drives? Take a pass on open-source TrueCrypt, which was recently found to have critical flaws.
September 29, 2015 XOR DDoS Attack Tool Being Used to Launch Over 20 Daily Attacks 3 min read - Threat actors are using a previously discovered DDoS attack tool to launch over 20 daily attacks against legitimate organizations, new research showed.