Endpoint Security

Endpoint security news, trends, analysis and practical advice

Wikimedia (CC)
Business system of technology devices and functions

Hacker manipulating code

Hackers make drive-by attacks stealthier with fileless infections

Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.

computer hacker aa006208

Rigged industrial software site points to watering hole attack

Attackers have rigged the website of an industrial software firm with a sophisticated reconnaissance tool, possibly in preparation for attacks against companies from several industries.

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said

Hackers prey on Russian patriotism to grow the Kelihos botnet

A recent spam campaign encouraged Russian speakers to install malware on their computers to participate in DDoS attacks, researchers said

US warns 'significant number' of major businesses hit by Backoff malware

More than 1,000 major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of...

Stealthy malware 'Poweliks' resides only in system registry

A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.

PANIC! Stop using USB (it's ''fundamentally broken'') #BadUSB

BadUSB: Karsten Nohl and friends set up us the bomb. USB gadgets are totally unsafe. That's the stark warning from Security Research Labs, to be given at Black Hat in Lost Wages. Basically, any USB device can do anything it wants...

Pop quiz: How many security holes can you spot?

Tech support pilot fish works at a college where student organizations are supplied with computers -- which makes security a challenge. "The university advisor for each student group is supposed to reset the local student-worker...

Protecting email at a hacker conference

The upcoming hacker conferences, HOPE, Black Hat and DEFCON make this a good time to think about email security. Rather than end to end security, which requires both the sender and recipient to use the same security software, my...

New malware program targets banking data

There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.

Will full encryption sideline Google's targeted ads?

Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source?

Symantec SVP Dye: AV is DEAD to me

Peter Norton mourns the passing of AV (probably). Symantec (NASDAQ:SYMC) Senior VP Brian Dye is often good for a quotable quote. And this week is no exception. He's running around, telling anyone who'll listen, that antivirus is...

Security Manager's Journal: A deal that's too good to be true

An offshore coding vendor offers a great price for quality work, but it may be stealing the company's source code.

Google said to be eyeing a boost to encrypted sites in search results

Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.

The Woops of WPS (Wi-Fi Protected Setup) raises its ugly head again

WPS (Wi-Fi Protected Setup) is an alternate on-ramp to a Wi-Fi network. Thinking that clicking on the name of a network and entering its password is too hard, the Wi-Fi Alliance came up with the WPS protocol back in 2007. WPS...

Stung by file-encrypting malware, researchers fight back

Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.

BlackBerry pushes BBM Protected for end-to-end encrypted messaging

BlackBerry is promoting an upcoming end-to-end encrypted messaging service called BBM Protected for industries that need the highest levels of security.

Microsoft sketches out final Windows XP security updates for next week

Microsoft today said it will ship four security updates to customers next week that will include the final public fixes for flaws in Windows XP and Office 2003, both slated for retirement from security support on Tuesday.

Load More