The Latest in IT Security

minus
  • img
  • img
  • img
plus

Categories

THURSDAY, OCTOBER 19, 2017

Featured

Archives

Latest Comments

Social Networks

Defenders face creative adversaries who are constantly evolving their attack arsenal. To help the good guys know what they’re up against, here are some of the attack vectors that have been frequently used in recent months. Some of these vectors – like fileless malware attacks and ransomware – are likely well-known to security professionals. But […]

Read more ...

A sophisticated remote access Trojan (RAT) dubbed Hacker Door by researchers has appeared in active attacks and sharing many similarities to a backdoor of the same name that was released in 2004 and last updated in 2005. The new Hacker Door has updated and advanced functionality, report researchers at Cylance. Read More

Read more ...

In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn’t regulate the IoT market. It doesn’t single out any industries for particular attention, or force any companies to do anything. It doesn’t even modify […]

Read more ...

A post-intrusion technique developed by researchers at CyberArk Labs called BoundHooking allows attackers to exploit a feature in all Intel chips introduced since Skylake. The attack technique allows for the execution of code from any process without detection by antivirus software or other security measures, researchers said. Read More

Read more ...

With more than 2 billion active Android devices in the world, Google’s mobile OS is easily one of the most popular. With users actively using their mobile devices in all aspects of their personal lives and business activities, a lot of information is stored and managed by these Android devices. Consequently, cybercriminals have shifted their […]

Read more ...