Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Malware

Sanctions for NotPetya? You Betcha.

The White House deployed words to chide Russia for the NotPetya attack. On 15 February 2018, the White House Press Secretary released a blunt [...] More

The Latest

White House: WannaCry Ransomware Worm Slows – But Still Lurks in Wild

White House: WannaCry Ransomware Worm Slows – But Still Lurks in Wild

Everybody who depends on digital information systems, which is everybody, saw a few glimpses of silver lining from the WannaCry ransomware attack [...] More

Ransomware Nothing New – But Scope Significant

Over the weekend, businesses and critical services like banks, hospitals, telecommunications services and transportation hubs around the world were [...] More

When the Big One Hits, Who Will Be to Blame?

Friday’s global attack on computers in some 150 countries was clearly a wake-up call. It took government systems offline, affected corporations of [...] More

WannaCry Attack: Microsoft Questions Role of Intelligence Community

WannaCry Attack: Microsoft Questions Role of Intelligence Community

Who’s to blame for the astonishingly successful ransomware attack sweeping the planet?Microsoft, the information technology giant whose popular [...] More

Microsoft: NSA vulnerability leak “equivalent” to losing a Tomahawk Missile

Microsoft: NSA vulnerability leak “equivalent” to losing a Tomahawk Missile

In response to the massive Wannacry ransomware attack that infected over 200,000 computers around the world, Brad Smith, Microsoft’s President and [...] More

WannaCry Warning: Public-Private Must Come Together

As businesses wake up to the possibility that the WannaCry ransomware tool will spread beyond the already estimated 200,000 computers already [...] More

When Bots Take Over Your Facebook Page

As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the growth of [...] More

The Power of Botnets: Amplifying Crime, Disinformation, and Espionage

The Power of Botnets: Amplifying Crime, Disinformation, and Espionage

Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this [...] More

Credential Theft: The Key to Shamoon 2 Data Destruction

The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full [...] More

Day 1: Dispatch from RSA Conference

Day 1: Dispatch from RSA Conference

This week I’m attending the annual RSA Conference in San Francisco, where government and industry leaders have come together to discuss the looming [...] More

Keeping Your Mobile Phone Secure

Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to their [...] More

The Threat to Business

Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new [...] More