Security News & Reviews - Page 3
More Security News
Please join us April 12 for an eWEEKchat about behavioral biometrics and why they might be the key to stronger IT security at several different levels.
DAILY VIDEO: Chinese nation-state hackers target U.S in Operation TradeSecret; SAP report finds digital technology isn’t improving collaboration; Google claims progress reducing fake business listings on Maps, Search; and there's more.
McAfee and FireEye both report a previously undisclosed vulnerability in Microsoft Office that is being actively exploited by attackers.
According to McAfee Labs, new volumes of malware, ransomware and spam tapered off at the end of 2016, though macOS wasn't as fortunate.
Symantec makes a connection between the Vault 7 hacking tools allegedly developed by the CIA and a group known as Longhorn that has attacked at least 40 different targets across 16 countries.
IBM Security researchers discover a variant of the Mirai IoT botnet that was doing more than just performing DDoS attacks against targets.
The open-source Xen virtualization project patches a security vulnerability that could have enabled an attacker to breakout from hypervisor isolation. But unlike a Xen flaw in 2014, this time public cloud providers do not have to reboot all their servers.
The security vendor bolsters the endpoint detection and response capabilities of its Endpoint Threat Platform with the addition of data loss prevention in a bid to reduce risk.
Fidelis Cybersecurity releases a report providing insight into an attack against the National Foreign Trade Council website, allegedly conducted by nation-state backed attackers in China.
Google's April update for Android, patches 15 new mediaserver flaws, six of which are rated as having critical impact.
As the Tax Day 2017 filing deadline of Tuesday April 18 nears, IBM is warning of an increase in tax-related spam and scams.
Intel officially completes its spin-out of McAfee, enabling the security vendor to once again be an independent company, focussed on the evolving threat landscape.