There are no specific tools or sure-fire techniques for tripping up attackers trying to grab data. There are, however, ways to configure and architect the environment to slow them down and potentially stop them in their tracks, or even shut them down before they manage to pilfer anything.
Websense has documented the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber attacks.
Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.
A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
The Supreme Court has declined an early look at a constitutional challenge to the National Security Agency's bulk collection of millions of Americans' telephone records.
The clock is ticking — as of this week Microsoft will no longer support Windows XP. The operating system will pose an increasing risk to its users, making it more important than ever for organizations to identify and upgrade legacy systems wherever possible, or have stringent network security in place to mitigate the risks.
Authorities around the world should set up emergency communication teams to manage the amount of misinformation circulating on social media during disasters, terrorist attacks and other social crises.
Kaspersky Lab has launched an interactive cyberthreat map that visualizes cybersecurity incidents occurring worldwide in real time.
Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.
Mobile Point of Sale (MPOS) devices can be easily hacked, leaving banks, retailers and millions of customers exposed to serious fraud around the world, global information security firm MWR InfoSecurity has revealed at the SyScan security conference in Singapore.
The past few days have revealed new data that suggests the recent upsurge in malware targeting routers is not only continuing, but it's spreading to digital video recorders (DVRs).
As Microsoft readies the eulogy for Windows XP, data from security firm Trend Micro shows that nearly a third of PCs still run on the operating system — leaving a wide swath of the PC user base susceptible to cybercriminal exploits.
Once a year, five battalions belonging to the Army Reserve Information Operations Command come together from across the U.S. to participate in their annual training. This year just over 200 soldiers participated in the training event, which took place March 22-29 at Fort Dix, N.J.
The chief executive of Japan's Mt. Gox, once the world's leading bitcoin exchange, was ordered to the United States to answer questions related to its U.S. bankruptcy case, filed after the company lost $400 million of customers' digital currency.
Another week, another explosive revelation coming from Edward Snowden's archive of NSA documents. This time they reveal the widespread compromise of several German satellite communication providers by the hands of Britain's GCHQ intelligence service and the US NSA.