4 ‘Exotic’ Programming Languages Popular With Malware Developers Dice Staff, August 5, 2021 9 min read When it comes to cybercrime, even malware developers need to brush up on certain programming languages to stay...
Protecting Remote Workers Against COVID-19 Ransomware Dice Staff, June 9, 2020 9 min read Even before the global COVID-19 pandemic, ransomware stood out as one of the biggest security challenges...
Getting Rid of Lenovo’s Superfish Vulnerability Nick Kolakowski, February 23, 2015 2 min read As you may have heard by this point, Lenovo loaded an adware package called Superfish Visual Discovery onto many of its...
Report: Target Bosses Ignored IT Alert of Impending Breach Kevin Fogarty, March 13, 2014 6 min read Target managers didn't respond to warnings from IT about the impending breach. A Target Corp. security team in...
‘Russian’ Spyware Called a Cutting-Edge Threat Kevin Fogarty, March 7, 2014 7 min read 'Russian' rootkit is so sophisticated, AV firms can't even agree on a name. A host of better-known security vendors...
Stop Botnets by Knowing a Zombie From a User Kevin Fogarty, February 4, 2014 6 min read Better profiles of 'normal' net activity can help pick botnet traffic from the background. Identifying calls...
Analyst Calls Russian Teen Author of Target Malware Kevin Fogarty, January 18, 2014 8 min read Screen shot showing the alleged author of the malware used in the Target attack. A digital-activity data analytics...
Hack of Retailers Shows Malware Pwning POS Kevin Fogarty, January 13, 2014 7 min read Target CEO admits massive data breach caused by malware at POS. Attackers using techniques similar to those that...
IT-Savvy Users Infected More Often Than Noobs Kevin Fogarty, December 16, 2013 5 min read It's clear users are a security risk, but not why. A research project its leaders call the first "clinical" study...
Researchers Find Ways to Sneak iPhone Malware Past Apple Kevin Fogarty, December 5, 2013 5 min read Researchers conclude Apple's secretiveness weakens its app-vetting process. Security researchers posting attack...