FireEye researchers have identified several pieces of malware that managed to go undetected by antivirus engines for extended periods of time by using some interesting techniques.
FireEye researchers have identified several pieces of malware that managed to go undetected by antivirus engines for extended periods of time by using some interesting techniques.
Has Your Network Segmentation Approach Changed in light of new Technologies and Business Models?
Any information security professional knows that spear-phishing is effective. Cloudmark calls it "The Secret Weapon Behind the Worst Cyber Attacks", and lists 10 recent major breaches, from Target to OPM, that started with a successful spear-phish.
Google Fixes Flaws That Could Have Allowed Hackers to Hijack User Accounts
A researcher got $12,500 from Google for reporting several vulnerabilities in the account recovery process that could have been exploited to change a user’s password.
Security researcher Mike Olsen's recent discovery of a malicious iFrame in the embedded control code of a set of security cameras purchased from Amazon highlights one of the emerging threats to the internet of things: it is relatively easy to poison the consumer supply chain.
A former employee of the U.S. Department of Energy (DoE) and the Nuclear Regulatory Commission (NRC) has been sentenced to 18 months in prison for trying to hack into DoE computers in an attempt to steal nuclear secrets.
Washington - Two key US lawmakers Wednesday unveiled legislation to require technology firms to help law enforcement unlock encrypted devices -- prompting a fierce outcry from the industry and privacy activists.