article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

Google Play store inundated with scam apps, Symantec says – “A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.” They then resold these for varying amounts, depending on the origin of the card.

Symantec 226
article thumbnail

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. Co-founders Welcome New Members in Concerted Effort to Combat Advanced Cyber Threats. Santa Clara, Calif.,

Symantec 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

Cyberattacks such as malware infiltration and vulnerability exploitation continue to make headlines, attacking companies of various sizes. This ensures that any potential malware will be completely localized and neutralized, never hitting the endpoint. Websites and web applications are made up of HTML, CSS, and JavaScript code.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

Your data should be securely stored on the provider's computers—not only in database or file storage, but in application processing. In the past, most cloud services have provided encrypted data storage, but few took measures to ensure that data is also protected when in use by applications. Access Control. Organizations are losing 7.6

Cloud 150
article thumbnail

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such. browsers, Office applications, and Windows utilities) to achieve their objectives. PCworld on Macrobased Malware. Microsoft on Macro Malware. Trendmicro on Macro Malware.

Malware 150
article thumbnail

Broadcom Software Shows Why Zero Trust is Important Everywhere

CIO Business Intelligence

A specific example of this was a new form of disk-wiping malware (Trojan.Killdisk) being used to attack organizations in Ukraine shortly before the launch of a Russian invasion on February 24. Meanwhile, geopolitical conflicts are threatening to cause spillover effects on corporate networks. Context becomes critical to establishing trust.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. When they did that. I don't think we'll ever have enough people.

System 52