A new Dell report found that though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without detracting from other business initiatives.
Attackers used authorized credentials in more than 76 percent of network intrusions in 2013, allowing them to impersonate legitimate network traffic while conducting suspicious activities.
The Cisco 2014 Midyear Security Report, released at Black Hat U.S. examines the “weak links” in organizations that contribute to the increasingly dynamic threat landscape.
Police in 16 countries seized cash, firearms and drugs and arrested 80 people suspected of peddling virus software believed to have infected hundreds of thousands of computers.
New York's banks will face new cybersecurity assessments carried out by the Department of Financial Services (DFS), under plans unveiled by Governor Andrew Cuomo.
McAfee Labs collected 2.47 million new mobile malware samples in 2013, with 744,000 in the last quarter alone.
April 1, 2014
The mobile malware “zoo” totaled 3.73 million samples at the end of the year. According to McAfee Labs Threats Report, Fourth Quarter 2013, malware can arrive on a mobile device through just about every attack vector, such as downloaded apps, malicious website, spam, malicious SMS messages, and malware-bearing advertisements.