This year, cyberattacks continued to plague business leaders, with major breaches occurring due to known vulnerabilities. Trend Micro predicts this trend will continue in 2018 as corporate attack surfaces expand and expose more security holes. As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, according to the firm’s 2018 predictions report. Additionally, Trend M...
INFOSECURITY MAGAZINE
READ MORE
|
Security experts are warning that Yahoo, YouTube and Amazon amongst others are serving up malicious ads to Windows and Mac users thanks to a newly discovered malvertising network....
INFOSECURITY MAGAZINE
READ MORE
|
The software supply chain is increasingly under threat by attackers who seek to turn legitimate software programs into Trojan horses that can compromise millions of computers. On Monday, security-software firm Avast announced that its popular system-cleaning program CCleaner—developed by Piriform....
EWEEK
READ MORE
|
Quantum computers will be able to instantly break the encryption of sensitive data protected by today's strongest security, warns Arvind Krishna, director of IBM Research. "Anyone that wants to make sure that their data is protected for longer than 10 years should move to alternate forms of encryption now," said Krishna. Krishna was speaking at IBM’s Think 2019 event held in San Francisco, offering insights into what the real world impact of Quantum computing can potentially ...
EWEEK
READ MORE
|
Malicious actors could hijack millions of systems using specially crafted subtitle files that exploit vulnerabilities in some of the most popular media players, security firm Check Point warned on Tuesday.According to experts, attackers can take complete control of a device simply by getting the targeted user to open a malicious subtitle file in one of the vulnerable media players. In the case of applications that automatically obtain subtitles from the Internet, it may be possible to conduct at...
SECURITYWEEK
READ MORE
|
BURLINGTON, Vt. - Several states around the country on Saturday asked cybersecurity experts to re-examine state and utility networks after a Vermont utility’s laptop was found to contain malware U.S. officials say is linked to Russian hackers. U.S. intelligence agencies believe Russian hacking units often use other people’s computer networks to “hide their malicious activity,” CBS News homeland security correspondent Jeff Pegues reports. Newly declassified documents show ...
CBS NEWS
READ MORE
|