Addressing the need for a more efficient way to defend against spam in the early 2000s, the antispam industry turned to machine learning. The effect: Overall cyberdefense was enhanced to catch approximately 95 percent of spam.
VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide, affecting both enterprise and home networks.
A researcher found MEWKit targeting MyEtherWallet users in a phishing campaign, draining online wallets unnoticed through an automated transfer system, as well as getting their login and exchange credentials.
We delved into the rise and fall of Scan4You, the largest counter antivirus service in the underground, its operators, and the ties that bind them to other cybercriminals.
IP surveillance cameras provide certain conveniences, but control of this can fall into the wrong hands. What threats are there for these devices and what can be done to minimize risk?
Today's increasingly interconnected environments pave the way for threats that will bank on systems' weaknesses for different forms of cybercrime. How can you prepare for the year ahead?
In light of the reported attacks and Proofs of Concepts (PoCs) leveraging Dynamic Data Exchange (DDE), Microsoft released Security Advisory 4053440 that provides guidance on securing DDE fields in Microsoft Office applications.