- January 23rd, 2015
Malware is an ever evolving field and as such security should be seen as a journey not a destination. One of the latest malware evolutions is the practice of Malvertising where attackers place malicious content in seemingly innocent adverts. When the user views the page the advert is loaded and the malware attempts to exploit the machine.
- January 12th, 2015
Just like fashion, malware goes through trends and comebacks, so let’s take a look at what’s ‘in’ this season. Anyone involved in IT in the 1990′s will remember a few things; plaid shirts, floppy disks and macro viruses. Although I can’t envisage the former two making a comeback any time soon, macros are definitely back on the InfoSec agenda, something Microsoft has been highlighting recently.
- December 22nd, 2014
As 2014 ends, many experts in the industry are giving their thoughts on what the New Year will look like from an IT security perspective. From the top ten malware threats to a growing list of security challenges, you’d be forgiven for thinking that CIOs and CISOs face an uphill battle in 2015.
- November 24th, 2014
We’re all used to hearing about malware threats, with new variants of existing malware families appearing on a seemingly daily basis. What is far less common though is a totally new threat appearing, especially one that has apparently been operating unchallenged since 2008. Research published by Symantec describes just this; a new “ground breaking and almost peerless” malware threat known as Regin.
- November 9th, 2014
Earlier this year, a study from IDC and the National University of Singapore (NUS) predicted that enterprises will spend around $500 billion in 2014 on making fixes and recovering from data breaches and malware. In the past few months alone, we’ve seen Target reveal the cost of its recent breach could reach as much as $148 million. The figures are stark, but for the uninitiated the world of malware and its history is something of a mystery. So, where did they originate? How have they changed? And what does the future of malware look like?