The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.
The 2013 edition of the FireEye Advanced Threat Report analyses more than 40,000 advanced attacks across the globe to map out the latest trends in advanced persistent threat (APT) attacks. Leveraging real-time threat intelligence from millions of security alerts across customer deployments, FireEye tracked more than 160 distinct APT malware families and logged 22 million command-and-control (CnC) transmissions. This report correlates that intelligence to provide insight that spans countries, industries, and threat vectors.
Data breaches have compromised more than 20 million Californians' personal information in the past two years, with about a third of the breaches aimed at small businesses. Find out how to protect your customers.
PEORIA — While technology can provide information at the touch of a button, the computer age also has its downside. Just ask the millions of U.S. shoppers who had credit and debit card information stolen when the Target retail chain was the target of a recent cyber attack.
It is more than 24 months since we released Trend Micro Mobile App Reputation Service. The number of malicious and high-risk mobile apps grew from a few thousand to now more than 1.4 million. The mobile security landscape continues to change.
The continuing Ukrainian conflict brings to mind a quote from the late Sen. Eugene McCarthy: “Eighty percent of the world's problems are the fault of British mapmakers.” Dave Gonigam expounds on this idea.