CryptoLocker Ransomware Is on the Rise — Here’s What to Do if You’re Attacked The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks.
Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.
GootKit: Bobbing and Weaving to Avoid Prying Eyes IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.
3-D Printing Vulnerabilities: Build Your Own Breach? A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.
Botnet Detection Advances With the Use of Big Data Analysis in Europe The European Union is embracing new methods of botnet detection to fight cybercrime and improve the security of member nations.
Insider Threats, Industrial Sabotage and Game Theory Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.
Bug Poaching: A New Extortion Tactic Targeting Enterprises Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.