Police in Europe have arrested 17 suspects as part of an EU-wide investigation into ATM black box attacks, Europol says. These "jackpotting" or "cash-out" attacks use rogue hardware to trick ATMs into dispensing all of their cash on demand.
Internet of things devices are vulnerable to an array of potential cyberattacks, including zero-day exploits, distributed denial-of-service attacks and passive wiretapping, according to a new GAO report, which cites mitigation advice from experts.
The digital transformation in the APAC region is being driven significantly by mobility and cloud, and there is a need to recalibrate the approach to security to factor in the new realities, regulations and challenges, says IBM Security's Vaidyanathan Iyer.
Weeks before the WannaCry outbreak, other attackers unleashed malware that targeted the same SMB flaw in Windows. But instead of installing ransomware, this campaign instead infected endpoints with Adylkuzz cryptocurrency mining software, security researchers say.
As organizations struggle to deal with the rising security demands associated with complex networks and myriad, ever-mutating external threats, it's imperative to ensure that the right endpoint security solution is in place. This means complete endpoint security that provides full cycle protection that includes...
As organizations around the globe - including hospitals in the United Kingdom - recover from the WannaCry ransomware campaign, healthcare entities in the United States so far appear to have mostly avoided the crisis. But why?
Microsoft's chief legal officer has slammed U.S. spy agencies, warning that civilians are at risk if governments stockpile libraries of software vulnerabilities that eventually fall into the hands of cybercriminals.
Criminals have long aimed to separate people from their possessions. So for anyone who follows ransomware, the WannaCry outbreak won't come as a shock. Nor will longstanding advice for surviving ransomware shakedowns: Prepare, or prepare to pay.
Microsoft has issued emergency security updates for some unsupported operating systems to protect against the global WannaCry ransomware outbreak. In addition, a researcher has accidentally disabled new infections from crypto-locking PCs, though he warns the respite will likely be temporary.
Organizations must adopt a multi-layered, defense-in-depth approach to online security to combat today's threat landscape. Rather than relying on just one or two of the so-called 'next-gen' techniques in isolation, a robust, multi-layered approach should involve a vast array of signature- and non-signature based...
Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure.
Download this whitepaper that covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging...
To handle new forms of threats like cyber espionage or ransomware enterprises need to evolve their endpoint protection solutions to cover all threat surfaces.
Download this whitepaper to review the effectiveness of seven different products, on several different attack vectors and learn how you can make your...
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
Organizations have more endpoints today than ever, and securing those endpoints is challenging, because it's rare that any one organization is responsible for all the endpoints that touch its network and servers, says Mike Spanbauer, vice president of research and strategy at NSS Labs.