A nasty banking Trojan dubbed Metamorfo uses “malspam” to exploit legitimate Windows components to make convincing phishing emails.
Our cybersecurity reporter has harsh words for governments looking to ban products from Kaspersky over unproven claims the Moscow-based company is tied to Russian espionage.
Cyberattacks have left IT professionals searching for new weapons to defend their systems. Algorithms that can spot intruders before they do damage may hold the key to IT security.
Researchers have found a new iOS sync vulnerability tied to a function within iTunes’ WiFi Sync. If this vulnerability is exploited properly, attackers can gain control of a victim’s device.
Your office printers are multifunctional devices that print, scan, fax, copy, scan to cloud, and so on. But without printer security, you’re leaving a door open to your organization’s network.
Multi-factor authentication can reduce the effectiveness of stolen credentials, but as long as the password is still at play, MFA will only have a band-aiding effect on the overall security […]