Study: Russia spends up big on hacking groups using unique code to protect operations
Russia's lesson to hackers: different teams should avoid sharing code in espionage attacks.
Russia's lesson to hackers: different teams should avoid sharing code in espionage attacks.
Microsoft explains how to disable a protocol that attackers are using to install malware.
A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported.
Antone Gonsalves | 08 Aug | Read more
All malware is bad, but some malware is more insidious than others. That seems to be the case with CosmicDuke. According to a new white paper from F-Secure, CosmicDuke meshes elements of two notorious malware threats--MiniDuke and Cosmu--to form a potent new attack.
Tony Bradley | 03 Jul | Read more
Many security executives are getting a "false sense of security" in their data-encryption capabilities due to "primitive" solutions that leave private keys exposed to threats from insiders, Vormetric's local head has warned as new research suggests compliance requirements, advanced persistent threats (APTs) and increasing customer expectations are making Australian organisations feel insecure.
David Braue | 01 May | Read more
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
By Saryu Nayyar, CEO, Gurucul | 01 Apr | Read more
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
Thor Olavsrud | 28 Mar | Read more
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
Thor Olavsrud | 20 Feb | Read more
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Thor Olavsrud | 09 Jan | Read more
Gartner has positioned Check Point as a Leader in the Mobile Data Protection (MDP) Magic Quadrant for the eighth consecutive year.1 Gartner evaluates each company’s MDP offerings on a scale of completeness of vision and ability execute. Read the full report to see which vendors made it to the Magic Quadrant, compare their strengths and cautions, and see what Gartner says about Check Point.