article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

Google Play store inundated with scam apps, Symantec says – “A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.” They then resold these for varying amounts, depending on the origin of the card.

Symantec 226
article thumbnail

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

February 13, 2015 – Fortinet (NASDAQ: FTNT), McAfee Labs, Palo Alto Networks® (NYSE: PANW) and Symantec (NASDAQ: SYMC), co-founders of the industry’s first cyber threat alliance, today announced that Barracuda Networks, Inc. Co-founders Welcome New Members in Concerted Effort to Combat Advanced Cyber Threats. Santa Clara, Calif.,

Symantec 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

Cyberattacks such as malware infiltration and vulnerability exploitation continue to make headlines, attacking companies of various sizes. This ensures that any potential malware will be completely localized and neutralized, never hitting the endpoint. Websites and web applications are made up of HTML, CSS, and JavaScript code.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

Your data should be securely stored on the provider's computers—not only in database or file storage, but in application processing. In the past, most cloud services have provided encrypted data storage, but few took measures to ensure that data is also protected when in use by applications. Access Control. Organizations are losing 7.6

Cloud 150
article thumbnail

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

Many of us in the community, myself included, have long said that anti-virus is dead and even a senior VP at Symantec has now admitted such. browsers, Office applications, and Windows utilities) to achieve their objectives. PCworld on Macrobased Malware. Microsoft on Macro Malware. Trendmicro on Macro Malware.

Malware 150
article thumbnail

Broadcom Software Shows Why Zero Trust is Important Everywhere

CIO Business Intelligence

A specific example of this was a new form of disk-wiping malware (Trojan.Killdisk) being used to attack organizations in Ukraine shortly before the launch of a Russian invasion on February 24. Meanwhile, geopolitical conflicts are threatening to cause spillover effects on corporate networks. Context becomes critical to establishing trust.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others. There are’s a lot to unpack here. First, this is a supply chain issue. Vamosi: This is bad.