The company's Q1 2015 roundup highlights zero-day exploits, malvertising, and the uptick in threat activity on POS systems.?
The company's ThreatCloud World Cyber Threat Map visualises how and where attacks are taking place worldwide.
The vulnerability gives the attacker the ability to fully compromise any online store based on the platform, says Check Point.
The Maitland Group's information security officer outlines a proposed framework for using OSINT for investigating social networking apps.
The solutions feature an increase in network performance, the ability to analyse encrypted SSL traffic, and an integrated wireless controller.
The single biggest thing that will defeat ransomware is having a regularly updated?backup routine in place, says?Nathan Loftie-Eaton, security specialist at ESET SA.
Its ethical hacking service?identifies vulnerabilities that would allow unauthorised alteration of configuration settings or that would introduce malware into a car.
Newly discovered iOS vulnerability could send Apple devices into perpetual reboot cycle, says Skycure.
Should the US be given custodianship of encryption keys needed to decrypt data, other governments will start insisting on it too, panellist says.
Attackers hijack the infrastructure of major corporations and use it against them, according to Symantec's latest Internet Security Threat Report.
The top three financial malware families affecting South Africans are Swisyn, Dorkbot and Zeus/Zbot, research from Trend Micro has found.