New malware strain doesn’t need a file

How can you destroy malware that doesn’t exist on a file? 

Business users targeted by phishing on Dropbox

Hackers are sending out phishing emails to users trying to get them to access a file on the popular file-sharing service Dropbox. And if your users open it, your company could be in for a serious headache. 

New developments in ransomware: And it’s bad news

When hackers steal data, it’s a crap shoot. Maybe they’ll find valuable information they can sell to an interested party, but they may not get good info or have interested customers. So to get around that, a new trend is taking place – one that’s an easy payday for them, and a nightmare for IT and your […]

‘Malvertising’ shoots up as an IT concern

You know a cyberthreat is bad when even Congress is taking time to look into it. And with the rise of malicious advertising – or malvertising – they’ve had good reason to take note. 

Android flaw succeeds despite security advice

There are some basic rules for mobile security that have long been thought to keep you in the clear. But researchers have discovered these rules might not be able to protect Android devices from “pileup” malware. 

The Android malware trend no one’s talking about

Another day, another study showing Android dominates Apple in mobile malware. But the latest study also has another figure that will be of interest to IT – one that doesn’t get nearly enough coverage. 

3 things every IT pro can learn from the Target attack

Even if your company isn’t in retail and has never processed a credit card transaction, there are some major lessons to be learned from the recent Target data breach. 

Will you be ready for the top security threats of 2014?

It’s December, which means it’s the time to look back on the year’s best-of lists, top news stories … and yes, even malware attacks and security threats. 

3 ways malware is bypassing companies’ antivirus software

Most companies are using antivirus software, firewalls and other security tools to protect their networks. But attackers are constantly finding new ways to get around those controls. 

Top 3 places malware is hiding now

Cyber criminals always seem to stay one step ahead of IT – as protections improve in some areas, the hackers shift their focus to others.