Tag "Software Security"

Back to homepage
Software

Sites using session replay scripts leak sensitive user data

When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the expectation that it will be

Hardware/Network

Fileless Malware Prompts Evolution of Endpoint Defenses

Conventional network endpoint defense used to rely largely on the basic fact that computers primarily used files to communicate. Files were not only transmitted to and from other systems, but

Software

Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is that most new

Software

What motivates bug hunters?

Crowdsourced security penetration testing outfit Bugcrowd has released its second annual “Mind of a Hacker” report, to provide insight into bug hunters’ motivations and preferences, and help companies tailor their

Mobile Software

Mobile Malware Incidents Hit 100% of Businesses

Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.Every business with BYOD and corporate mobile device users across the globe has

Software

Attackers Exploiting Microsoft DDE Protocol to Install Malware

Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware. Microsoft has warned about the issue, and given users guidance on how to protect themselves, but does

Software

The Evolution Of The Password: How To Protect Your Business Against Modern Security Threats

Earlier this year, thieves exploited a weakness in SS7, a telephony routing protocol, to steal passwords to online bank accounts in Germany. The attackers were able to access two-factor authenticated

Mobile

Android users warned of malicious apps hidden in Google Play Store

ESET report reveals multi-stage malware lurking in family of legitimate-sounding apps.Android users have once again been warned to take care when installing new apps on their phone after yet another

Software

The long tail of phishing attacks

Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data breaches that

Software

Q3 Sees a Whopping 400M Malware Infections

There were nearly 400 million malware incidents around the world in the third quarter, permeating throughout every nation-state on the planet.According to Comodo Threat Research Labs’ Q3 2017 global report,