The Tor network, set up to provide anonymity for users, is increasingly being used by cybercriminals to host malicious infrastructure, warns Kaspersky Lab.
Advanced persistent threats are on the rise, and phishing emails are the preferred method of attack, according to a survey of 200 U.S.-based employees conducted by security firm SilverSky.
I saw a disturbing survey today that was carried out by Vision Critical on behalf of security firm Absolute Software. The survey finds that one-quarter of enterprise workers do not think that data security is their responsibility and that they should face no punishment if they lose sensitive corporate data.
The author of the Neutrino exploit kit, which targets Java vulnerabilities, is for sale for $34,000, reports Softpedia, citing security researcher Trojan7Sec as the source.
Half of exploits in the enterprise targeted Java vulnerabilities in December, a big jump from the same month in 2012, according to data collected by IBM's Trusteer.
Malware on the Android is exploding, according to a new study, the Mobile Security Threat Report, unveiled by security firm Sophos last week at the Mobile World Congress.
SAN FRANCISCO--The Federal Bureau of Investigation plans to offer an unclassified version of its malware repository and analysis tool known as the Binary Analysis Characterization and Storage System to the private sector later this year, the agency's director, James Comey, told an RSA Conference audience last week.
While four-fifth of employers allow their employees to bring their own devices to work, two-thirds cannot identify common mobile security threats, such as malware infection on devices or installation of unwanted apps.
Mobile malware is running amok on company provided and BYOD mobile devices, a new research study finds, making it the top security concern for many security pros.
As we get further away from the massive Target data breach that compromised 40 million payment card accounts and exposed personal data on another 70 million customers, the initial news fades from memory. Yet the details of the breach provide a blueprint of how not to handle IT security.