The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...
Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...
Microsoft’s security patching machine hummed into overdrive Tuesday with the release of fixes for at least 97 documented software vulnerabilities, including a zero-day that’s...
With much of the focus on blocking inbound spam to networks, there is significant oversight in what’s happening with outbound spam coming from organizations...
Anti-spam industry organization, the Messaging Anti-Abuse Working Group (MAAWG), announced today that it is offering free training to educate messaging professionals on the latest...
The Avalanche phishing gang was responsible for two-thirds of all phishing attacks on the Internet according to the Anti-Phishing Working Group’s semiannual Global Phishing...
Vice President of Technology and Innovation at Verizon, Peter Tippett, speaking at the Infosecurity Europe trade show in London this week, made an interesting...
As the number of cyber attacks against businesses increases, the majority of small and medium-sized businesses (SMBs) are not familiar with many of the...
Symantec (Nasdaq: SYMC) today unveiled beta versions of the Norton 2011 AntiVirus and Norton 2011 Internet Security, available now as free download. With performance...
Researchers at offensive hacking shop Synacktiv demonstrated successful exploit chains and were able to “fully compromise” Tesla’s newest electric car and take top billing...