Is your Android phone a ‘toxic hellstew’ of vulnerabilities? There’s an app to help you find out

It seems that some Android smartphone makers are lying to users about the patch status of their devices, telling them that they’re up-to-date when they aren’t. Here’s how to find out if your Android smartphone is lying to you. The first step is to take a trip to the Google Play Store and download SnoopSnitch, an app […]

New Intel processors to have hardware-based protections against Meltdown, Spectre 2

Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years. In addition to this, the company’s CEO announced new, redesigned processor lines that will start shipping later this year and will include hardware-based protection for Meltdown (exploiting CVE-2017-5754, a rogue cata cache load flaw) […]

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are highly sought after, to the point where good ones are expensive and hard to come by. So this is a challenge when more and more organizations, reeling in the wake of CISO-less breaches like Target and the UK’s TalkTalk, recognize the value in having one in place. Could an on-demand virtual […]

Microsoft: Windows Defender can now spot FinFisher government spyware

Microsoft says it has cracked open the notorious FinFisher government spyware to design new ways to detect it and protect Windows and Office users. FinFisher is sold to law-enforcement agencies around the world and its maker, European firm Gamma Group, has been criticized for selling it to repressive regimes. Last year, researchers at FireEye discovered FinFisher […]

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An intrusion detection system, or IDS, monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds such items. Enterprise IT departments deploy intrusion detection systems to gain visibility into potentially malicious activities happening within their technology environments. Each IDS is programmed to analyze […]

Microsoft boosts Windows Analytics to help squash Meltdown and Spectre bugs

A day after Microsoft announced it will be adding Windows Defender ATP down-level support for older OSes comes the news that its Windows Analytics service is getting new capabilities aimed at helping businesses tackle Meltdown and Spectre vulnerabilities on machines in their fleet. Windows Analytics is a free telemetry analysis tool for business administrators. It is meant for guiding […]

Apple, Cisco partnership expands with cybersecurity insurance offering

Apple and Cisco announced Monday that they’re partnering up with insurer Allianz and risk evaluator Aon to offer discounts on cyber insurance to joint business customers. The companies said the aim is to offer businesses a more efficient and affordable way to manage cyber risks from ransomware and malware threats by bringing together security technology, secure devices, […]

Researchers showcase automated cyber threat anticipation system

A group of researchers is trying to develop an automatic early warning system that should help defenders take preventative action before specific cyber attacks start unfolding. Their approach leverages the fact that preparation of cyber attacks often occurs in plain sight, discussed on online platforms and publicly accessible discussion forums. “The system monitors social media […]

Cisco ETA solves one of the biggest cybersecurity problems

Last summer, Cisco announced a product called Encrypted Traffic Analysis (ETA), which solves one of the biggest cybersecurity problems — finding malware in encrypted traffic. The use of encrypted traffic continues to grow. In fact, it’s over half of all traffic today and will be well over 80 percent by 2020. The benefit of encrypting traffic is […]

Best security software, 2017: How cutting-edge products fare against the latest threats

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection against the newest wave of threats. […]