New threats subverting digital signature validation

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50...

Read More

Visibility into Cloud applications, user risk, and attacker methodologies

Rapid7 has announced the general availability of its cloud application and user risk management solution, Rapid7 UserInsight, as well as several enhancements to its information-driven security analytics portfolio. With these innovations, Rapid7 is the first and only security analytics provider to offer visibility into user behavior across on-premise and cloud networks, to integrate phishing exposure information into user risk assessment, and to deliver fully closed-loop vulnerability validation...

Read More

CloudSigma offers infrastructure-level firewalls

CloudSigma has announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing complexity and stressing usability, CloudSigma’s new networking policy features enable customers to enhance their security, while also saving time.

Read More

Temporary workers still require adequate data protection training, warns ICO

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More


Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal...
New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
More executives state responsibility for data security should reside outside of IT.
Research reveals that companies investing in the latest cyber security products and services are...
Trend Micro intercepted a surge in malware, phishing and credential theft.
Neustar-sponsored study reveals challenges and benefits of using threat feeds.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more