Ingenuity can never be underestimated. A zero-day vulnerability was detected in MS Word, which can serve as a gateway for a remote attack.Recent analysis show that attackers have started using the zero-day to target users. How can users stay safe?
Curiosity killed the cat. In the virtual world, it leads to threats too. Stories of doom and terror proved that piquing interests is still an effective way for attackers to get into systems and wreak havoc just as the email subject reads.
The lure of money and power is simply irresistible. Opening the Pandora's box of data and information always leads to a pot of gold. Attackers are now see the value of going straight to the source, especially those with low security protocols in place.
Attackers were found attacking the website of a non-profit organization in the United States with an Internet Explorer zero-day exploit. Microsoft confirms that this particular vulnerability affects IE9 and IE10. Here's what IE users should know.
By the end of 2013, online banking malware, ransomware, malicious Android apps, and vulnerabilities stood out in the threat landscape. Questions arise as to how IoE will change this as threats advance towards smart devices.
The Consumer Electronics Show (CES) 2014 showcased exciting wearable devices that bring the perks of mobility and connectivity within reach. Lurking behind all these products, however, are privacy and security concerns that should be answered now.
As the Internet of Everything emerges as one of the biggest technology buzzwords in 2013, cybercriminals lay in wait for the next “killer app” that will let them into the vast information sourced from the new connected devices.