Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high.
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention.
Our roundup of new security products on hand at this week's show.
It's not just revenues and size, influence counts and excellence matters.
To ward off cyber-crooks trying to break into customers' accounts, banks are expanding their security efforts beyond desktops and onto iPhones and other mobile devices.
What ever happened to the "FIDO Alliance," that industry group that first showed up a year ago saying it was going to revolutionize e-commerce online authentication by promoting a new multi-factor authentication protocol? Turns out the revolution in security is slow in coming but they're making some progress.
It's already been a prolific year for new IT security companies, and now Bitglass, Spikes Security and Cybereason are making their debuts this month.
IT and security managers at U.S. defense contractors say the impact of former NSA contractor Edward Snowden as the symbol of the insider threat has led to tighter security in their organizations -- and it's often meant they have less access privileges.
Payments made with mobile devices such as smartphones and tablets rose 55% over last year, reaching a total of 19.5% of all transactions processed worldwide in December by Amsterdam's Adyen.
Having migrated his company from on-site servers and applications to a cloud-based software-as-a-service, Nathan McBride, vice president of information technology at AMAG Pharmaceuticals, is now working to influence security by getting five cloud security service providers to build what he wants.
LiveJournal is a social-media blogging site that attracts millions of users each month from across the globe, especially the U.S. and Russia. Owned by Moscow-based SUP Media, its website is hosted in a Montana data center, and according to Tim Turner, the firm's London-based CIO, LiveJournal regularly faces massive distributed denial-of-service (DDoS) attacks.
Refrigerators might hold spam to keep it cold in the meat bin. But in the Internet of Things world, can fridges connected to the Web blast malicious e-mail as part of a botnet? And how about TVs or other smart devices? In the stranger side of the Internet of Things, Proofpoint said it uncovered a cyberattack in which compromised refrigerators and TVs sent out malicious e-mail. But Symantec, says it saw no evidence of such an attack.
Security start-ups Skyfence Networks and Zimperium made their official debut today, while another still in stealth mode, Bluebox Security, announced this week additional funding bringing it to a $27.5 million in venture capital.
Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city.