The Latest in IT Security

minus
  • img
  • img
  • img
plus

Categories

TUESDAY, DECEMBER 12, 2017

Featured

Archives

Latest Comments

Social Networks

For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. Read More

Read more ...

The cloud environment is elastic and moves fast. That elasticity applies to cyberattacks just as much, so it is critical for enterprises to have visibility into all the data that crosses its network. While moving workloads and applications to the cloud brings flexibility and agility, it also introduces multiple points of attack. Enterprises need to […]

Read more ...

A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation that could be used for new attacks. Read More

Read more ...

Following security risks and fearing Chinese cyberespionage attempts, the Indian Defense Ministry released an advisory at the end of November that indexes 42 Chinese mobile apps as dangerous, and asked border troops from the Indian Armed Force and Central Armed Police Personnel (CAPF) to urgently uninstall them from their smartphones. Read More

Read more ...

Researchers at security firm Fox-IT have developed a tool that allows investigators to detect the use of specific NSA-linked malware and recover event log data it may have deleted from a machine. Read More

Read more ...