U.S. Army, Towson University Aim to Advance Intrusion Detection

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity ...
Security Boulevard
IBM Warns Retailers of Trojan Threat

IBM Warns Retailers of Trojan Threat

IBM has issued a cybersecurity advisory warning about an attack method originally developed for defraud banks that now is being applied to the retail sector. Limor Kessem, global executive security advisor for ...
Security Boulevard
ransomware

The Rise of Fileless Malware

Fileless malware that can evade traditional anti-virus programs means organizations must employ additional measures to monitor and secure their networks. From crypto-ransomware and destructive malware to advanced persistent threats that exploit zero-day ...
Security Boulevard
Malicious Insider Threat

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee ...
Security Boulevard
Fileless Malware Rapid Expansion

Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number ...
Security Boulevard
Ready for tax season phishing scams?

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...
Mitigating Cyber Risks Technology

Mitigating Cyber-Risks in Everyday Technology Use

The various applications, devices and networks in use across the world have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information ...
Security Boulevard
Tech support scam alarms Chrome users

Tech support scam alarms Chrome users

With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little ...
Developing Nations Cybercrime

AC/DC Act: Good in Theory, Terrible in Practice

Last month, Georgia Congressman Tom Graves introduced H.R. 4036, the Active Cyber Defense Certainty Act (AC/DC Act). The legislation would permit certain “victims” of cyberattacks to engage in certain types of “active ...