Analysis of malware samples found among finance firms has uncovered an unusually large number of iSpy keylogger samples. iSpy is a variant of the notorious HawkEye logger.
Network-based malware protection specialist Lastline intercepted the logger's communication with the command and control server and detected the active exfiltration of website, email and FTP credentials, as well as license key information for installed products.
A new survey from data analytics platform Sumo Logic finds a staggering 98 percent of European companies face organizational challenges implementing security in cloud environments.
The survey of over 300 IT security professionals responsible for environments with significant investment in both cloud and on-premise IT infrastructure covered the US and Canada, and Europe, The Middle East and Africa (EMEA).
In the last 12 months, 44 percent of organizations have suffered at least one data breach. More worrying is that of those reporting a data breach, the average was almost 30 data breaches per organization in the last year.
This is according to a study from identity management company SailPoint, released at this week's Infosecurity Europe. These breaches cost the organizations nearly $1 million to address from an IT perspective, which excludes fines, lost revenue and brand damage.
People are happier in their work and more positive about the future if they're working in a digital environment, according to new research.
The report from cloud networking company HPE Aruba also shows workers are positive about using more automated technology, challenging the received wisdom that we’re all scared about machines taking our jobs.
Employees often spend valuable time keeping their various work apps coordinated and synchronized, which harms productivity.
Cloud-based mobile app building platform Appy Pie is addressing this problem with the launch of its 'Connect' tool, a productivity solution that allows businesses to streamline tasks and automate workflow across multiple applications simultaneously.
A large majority of people say they are concerned about their online privacy, but this is not reflected in their actions according to a new study.
The survey from Blue Fountain Media reveals that 90 percent of respondents are very concerned about their internet privacy and 48 percent wish 'more was being done about it'.
It's well known that sound at particular levels can cause problems -- we've all seen demonstrations of wine glasses being shattered by high frequencies, for example.
You might not think that's much of an issue for computers, but researchers at the University of Michigan and Zhejiang University in China have shown that sounds can be used to interfere with disks.
Using cloud apps is fast becoming standard practice for businesses and Microsoft Office 365 usage is accelerating ahead of Google's G Suite, according to a new report.
The 2018 Cloud Adoption Report from cloud security company Bitglass shows global cloud adoption has topped 81 percent -- a 37 percent increase since 2016 and a 238 percent increase since 2014.
Threat actors are increasingly looking to exploit the popularity and volatility of cryptocurrency in their attacks on mobile devices according to a new report.
The latest Mobile Threat Landscape report from threat management specialist RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources.
The possibilities born out of the Industrial Internet of Things (IIoT) may seem endless as the scale of what it can accomplish continues to rise. By adding edge computing into the equation, the benefits for enterprises increase even further due to the real-time capabilities it enables.
With this shift comes an increased focus on data, which is at the heart of all IIoT and edge deployments. However, some enterprises are in different stages than others when it comes to utilizing that data and getting the most actionable results out of it for valuable business decision making. We spoke with Jason Andersen, VP of business line management for infrastructure availability company Stratus Technologies, to find out more.
Employee experience platform Sapho is announcing a new identity solution to simplify how employees authenticate into systems and access their data and daily workflows.
Sapho's patent-pending Consolidated Identity system means employees can access what they need from a variety of applications without having to go into each application separately.
While 84 percent of security professionals believe cryptocurrencies are here to stay, most don't see them as a major threat to the enterprise, despite the rise in cryptomining attacks.
A study from network protection specialist Lastline shows 45.2 percent think cryptocurrency is a mainstream alternative to conventional currencies, while 38.9 percent think it's a fringe option. 14.5 percent say they would rather collect their salary in cryptocurrency than in a traditional currency.
Enterprise computing has often been reliant on proprietary database architecture, but this can be both complex and costly, putting up a barrier to innovation.
Now open source database specialist MariaDB is launching its latest enterprise offering with Oracle compatibility. This allows existing Oracle Database users to reuse existing code and established skill sets when migrating applications or deploying new ones.
Enterprise identity provider Okta is launching a new set of contextual access management capabilities that will allow businesses to eliminate passwords.
New Adaptive Single Sign-On (SSO) and enhanced Adaptive Multi-Factor Authentication (MFA) products allow decisions based on signals such as device, IP and geolocation context for smarter, more secure identity and access management.