News & Insights for the AI Journey|Friday, March 22, 2019
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

malware

Malware Goes ‘Polymorphic’

Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher ...Full Article

Hybrid Clouds Remain Unsecured as New Threats Emerge

The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams ...Full Article

Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware

A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article

WannaCry Lingers, Cyber Analyst Warns

One week after a ransomware attack cut a swathe across Europe and China, a range of after-action analyses have emerged as to how the exploit unfolded and how the ...Full Article

New Malware ‘Bricks’ IoT Devices

Despite repeated assurances that Internet of Things security issues are being addressed, so-called "in-the-wild" attacks on poorly secured devices reveal that securing the IoT still has a long way ...Full Article

IoT Deployments Fuel ‘Chaotic’ Cloud Security

Cloud security remains "complex and chaotic" and the Internet of Things threatens to increase cloud security risks, warns a survey of IT security managers conducted during last month's RSA ...Full Article

How Retailers Can Fend Off FlokiBot Malware

The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase in security threats. While many are concerned with online shopping, in-store retail ...Full Article

Forecast: Hackers Target Software-Based Nets

Among the growing list of security threats expected to expand in the coming year are hackers probing emerging software-defined infrastructure for vulnerabilities. According to a security forecast released this ...Full Article

The New Cyber Security Minefield: A Proactive, Not Reactive, Approach

In 2016, the cyber landscape shifted dramatically – at least on the adversary side. In the last few months alone, we’ve seen hackers penetrate organizations from the DNC to ...Full Article

Tear Down Those Security Walls

Securing the enterprise like a castle of yore is bad for business, employees, and customers, so enterprises must protect data wherever it resides -- in sensors, mobile devices, silos, ...Full Article
Page 1 of 212
Do NOT follow this link or you will be banned from the site!