Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
The risks of using OS X, iOS, Android and Flash Player increased this year, according to our research. The leaked data from Hacking Team also reflects this trend. In the first half of the year researchers discovered and disclosed 26 vulnerabilities; eight were zero-days.
The U.S. Department of Justice announced that charges have been filed against nine people who are suspected of running an international insider-trading and hacking scheme. The U.S. Securities and Exchange Commission, meanwhile, also unsealed a civil complaint charging the nine indicted defendants – and several other individuals and organizations – with related crimes.
There is a huge shortage of skilled professionals in cybersecurity, an industry that is crying out for new talent. These five child geniuses could be the future of the field, assuming of course they choose good over evil and ‘white hats’ over black.
In last week’s BlackHat presentation “Winning the Online Banking War,” Sean Park proposed the use of a new online banking security framework for banks and web app developers called “Malware Inject Prevention System.”
PwC, collaborating with CSO, the U.S. Secret Service, and the Software Engineering Institute CERT® Division at Carnegie Mellon University, surveyed more than 500 executives from U.S. businesses, law enforcement services and government agencies. Dark Reading and Black Hat surveyed 460 security professionals, predominantly at large companies, all of them past attendees of the Black Hat USA conference. These are the results.
The new program enables CSP partners with consumption-based pricing to take advantage of Trend Micro’s market-leading Deep Security solution, which is integrated with cloud offerings from AWS, Microsoft Azure, VMware vCloud Air, IBM Cloud or a CSP’s own public cloud.
During the first quarter of 2015, we saw how ransomware variants have evolved to do more than just encrypt valuable system files. Now we are seeing another feature rapidly gaining ground in the world of ransomware: the ability to increase the ransom price on a deadline.
As part of a threat intelligence research project, ESG surveyed 304 cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees), and asked them which types of internal security data they regularly collect, process, and analyze today. These are the results.
In less than a month, more than 20,000 IT professionals will converge at Moscone Center in San Francisco for VMworld 2015. This year, VMware plans to expand the conversation with its One Cloud, Any Application, Any Device™ architecture, which enables organizations to develop, deploy, and consume all applications through a unified hybrid cloud.
Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.