Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The North Korea-linked Lazarus group has been leveraging PowerShell to target both Windows and macOS machines as part of an attack campaign that has been ongoing since at least November 2018, Kaspersky Lab reports. [Read More]
Over 1 million ASUS users were likely impacted after attackers managed to inject a backdoor in the ASUS Live Update utility, Kaspersky Lab reports. [Read More]
Microsoft announced the availability of its Microsoft 365 advanced endpoint security solution across platforms, courtesy of Mac support added to Microsoft Defender Advanced Threat Protection (ATP). [Read More]
Microsoft is extending the protection capabilities of Windows Defender Application Guard with the launch of browser extensions for Chrome and Firefox. [Read More]
BlackBerry Cylance, the company that resulted from BlackBerry’s acquisition of Cylance, unveils CylancePERSONA, an endpoint behavioral analytics solution. [Read More]
Thunderclap vulnerabilities allow malicious actors to hack a computer and steal sensitive data by connecting a Thunderbolt peripheral device to the targeted system. [Read More]
Carbon Black’s security researchers recently discovered a new variant of the Shlayer malware that targets macOS versions ranging from 10.10.5 to 10.14.3. [Read More]
Researchers demonstrate that Intel’s SGX technology can be abused to hide an advanced piece of malware that can allow attackers to steal data and conduct activities on the victim’s behalf. [Read More]
The latest version of Chrome OS puts the Shill network manager in a sandbox and removes its root privileges. [Read More]
Cloud-based data backup provider Carbonite has agreed to acquire cybersecurity company Webroot for roughly $618.5 million in cash. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...