Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Endpoint security firm CrowdStrike has secured more than $200 million through a Series E round of financing, valuing the company at more than $3 billion. [Read More]
A newly added “Endpoint Verification” feature in G Suite provides administrators with increased visibility into the computers that have access to corporate data. [Read More]
IBM adds two new features to its MaaS360 with Watson unified endpoint management (UEM) product: Business Dashboards for Apps and Policy Recommendation Engine [Read More]
Apple's iOS 12 and macOS Mojave are set to bring several new security improvements when they arrive this fall. [Read More]
Malwarebytes acquires Binisoft, the maker of the Windows Firewall Control tool, to enhance its endpoint protection platform [Read More]
F-Secure announced on Thursday the launch of a new endpoint detection and response (EDR) solution named Rapid Detection & Response [Read More]
The Internet of Things (IoT) botnet known as Hide 'N Seek can now achieve persistence on infected devices and survive reboots, Bitdefender reports. [Read More]
Recently discovered “Lojack” agents containing malicious command and control (C&C) servers point to the Russian cyber-espionage group Sofacy, according to NETSCOUT Arbor. [Read More]
Despite the new technology of artificial intelligence enhanced behavioral detection, defenders are not yet winning the battle against malware attacks. [Read More]
A researcher has developed a tool that helps Mac laptop users detect evil maid attacks by monitoring the state of the device’s lid [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...