Security Trends 

Crowdstrike: On a Mission to Find Malware-Free Attacks

Crowdstrike CTO Dmitri Alperovitch explains how his company's newest Falcon platform improves security with detection and prevention.

Dridex and Email: A Nasty Social Engineering Team

Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.

Cyber Security's Big Data Problem

Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.

Programs Aim to Fill Cybersecurity Skills Gap

Symantec's Cyber Career Connection and the Air Force Association's CyberPatriot program both aim to address the cybersecurity skills gap.

Today's Top 5 Malware Threats

To fight malware, security teams must understand it. Here are five especially nasty forms of malware.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

The Internet of Things: 3 Security Requirements

As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.

IBM Boosts Cyber Security Education Efforts

IBM is investing in outreach to universities in a bid to better educate future security professionals.

Mobile Security's Budget Shortfall

Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.

Shellshock a Fail for Security Disclosure

Shellshock and the Xen vulnerability. One of these things is not like the other, and an expert says they can teach us a lot about how to disclose security vulnerabilities.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

Malvertising, Online Ad Networks a Dangerous Duo

Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

Internet of Things a Potential Security Disaster

Experts believe the Internet of Things will be highly insecure, at least in the early days.

Startup Spotlight: CloudPassage's Software-defined Security

As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.

Security Research and the Law: What You Need to Know

Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.

DefCon: Advice on Evading Black Helicopters

You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.

Yahoo CISO Details Challenge of Security at Scale

Security vendors focus on banks not Web-scale companies, says Yahoo CISO Alex Stamos.

Backoff PoS Malware Demonstrated at Black Hat [VIDEO]

Trustwave researchers demonstrate Backoff malware, which targets POS systems, at Black Hat. Attack that has compromised 600 retailers relies on Java.

Using Military Strategy to Fight Cyber Battles

What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason.

Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote

Black Hat keynote speaker Dan Geer has some radical ideas to reshape modern security, including a suggestion that the United States purchase security vulnerabilities and make them public.

Dude, How Secure Is My Connected Car?

With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.

Hackers Target Browsers, Especially IE: Bromium Labs

Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.