Security Boulevard’s 5 Most Read Stories for the Week, April 30-May 4

A new week, a new crop of security stories. Last week, privacy in public places, fileless malware, spam bots and fake accounts and the cryptomining worm MassMiner made headlines. Also, we offered some insight into how securing their network can help companies secure their future.

Missed out on any of the news? Here are the five most-read stories on Security Boulevard to help you out.

Stealing Infrastructure Cryptomining Attacks

Cryptomining Worm MassMiner Exploits Multiple Vulnerabilities

Hijacking computing resources for cryptocurrency mining, or cryptomining, is one of the major attack trends this year and the threat is growing increasingly aggressive. Security researchers warn of a new worm that uses a variety of techniques and exploits to enslave servers over local networks and the internet.“One family of ...
Fileless Malware Rapid Expansion

Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number of financial and other institutions that are generally thought of as being very secure. These kinds of attacks ...
Spam Bots and Fake Accounts

Spam Bots and Fake Accounts: Helping Solve the Security Identity Crisis

Despite how it sounds, in today’s age of fake news and fake accounts, websites that collect more identifiable information about their users are better-positioned to protect identities and even solve the widespread problems of spam bot and illegitimate user accounts.For context, look at the likes of Twitter and Facebook, which ...
Securing the Network

Securing the Network—and Your Organization’s Future—with a SOC

Just as you wouldn’t give your house keys to someone you just met, organizations don’t want to do business with those they don’t trust. As digital transformation becomes the norm, it provides opportunities for growth and exposes vulnerabilities with the potential to breech the trust that businesses work so hard ...
Privacy in Public Places

Privacy in Public Places

Does license plate information-gathering constitute an invasion of privacy?As you drive down Robert E. Lee Memorial Highway in the Virginia suburbs of Washington, D.C., a police camera captures and reads your license plate. After checking to make sure that the owner of the car is not a wanted fugitive or ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Sponsored Content
Upcoming Webinar
Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make ... Read More
May 29, 2018
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 12 posts and counting.See all posts by saleem