• May 26, 2014
    Are all these large-scale Point-of-Sale (PoS) system attacks proof that attackers target payment cards more? While naming 2013 the "Year of the Retailer Breach", Verizon says POS-related cases have gone down in numbers since they peaked in 2010.
  • May 26, 2014
    Ever heard of an attack that plays possum? The Siesta campaign gets in mostly via spear-phishing emails and then lies dormant for varied time periods before gathering information.
  • May 26, 2014
    Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?
  • May 19, 2014
    The latter half of 2013 lay witness to two new targeted attack campaigns: BLYPT, which hosts its servers in Romania and Turkey, and Esile, which targets government agencies in APAC to execute remote commands.
  • April 18, 2014
    With today’s aggressive attack environment, IT security people are indispensible; invaluable with the right tools. So how exactly can organizations take care of their information security personnel? Here are four areas where organizations can help.
  • April 06, 2014
    News of state-sponsored surveillance taught the whole world how critical it is to have the best data security against attackers, including the ones in your organization. How do you know which sets of data, if stolen, can ruin a business?
  • March 10, 2014
    Building solid threat intelligence can help organizations spot and mitigate targeted attacks in their early stages. This is why it’s important for enterprises to invest in internal and external intelligence as well as the expertise of reputable security analys
  • February 17, 2014
    The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud.
  • February 16, 2014
    The lure of money and power is simply irresistible. Opening the Pandora's box of data and information always leads to a pot of gold. Attackers are now see the value of going straight to the source, especially those with low security protocols in place.