A $100bn company that ran NotPetya-like malware on its network turned up a surprise defense
Lessons learned after customer deploys a de-fanged version of NotPetya on production systems.
Lessons learned after customer deploys a de-fanged version of NotPetya on production systems.
Hackers once again use legit Apple Developer ID to sign malware for Mac computers.
A pair of vulnerabilities found in hardware and software for playing Blu-ray discs might come in handy for secret snooping by the U.S. National Security Agency.
Jeremy Kirk | 02 Mar | Read more
An effort to search for cryptographic flaws in TrueCrypt, a popular disk encryption program, will resume even though the software was abandoned by its creators almost a year ago.
Lucian Constantin | 20 Feb | Read more
Nine software fixes were released Wednesday for OpenSSL, a critical encryption component for exchanging data on the web, although none of the problems are as severe as the "Heartbleed" issue found in April.
Jeremy Kirk | 07 Aug | Read more
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
Lucian Constantin | 31 Jul | Read more
With a flood of new general top-level domains (gTLDs) reaching Internet users in 2014, security UK firm NCC Group and a clutch of large Internet brands have announced a new secure domain they hope will turn out to be the most significant of them all.
John E Dunn | 24 Jun | Read more
A new national cyber security challenge - Cyber 10K - has been launched, with £10,000 up for grabs for each of the most innovative security solutions.
Antony Savvas | 06 Feb | Read more
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface.
Lucian Constantin | 04 Apr | Read more
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendors.
Lucian Constantin | 15 Mar | Read more