The Trojan's mechanisms have been refactored to use the Tor network as a means to anonymise itself, says Securonix.
There are several phases to be disrupted in slowing down or stopping a cyber attack.
IOT has resulted in new security breach entry points that will affect the enterprise, says DRS.
Advanced threats will evade signature-based anti-virus solutions like a hot knife through butter, says DRS.
The second quarter of 2013 saw a 20% increase in distributed denial of service attacks, according to Prolexic.
Companies focus too much on the technologies used in an attack as opposed to the motives behind the attacks, says DRS.
One of the most obvious signs of a breach is anomalous traffic leaving the network, says DRS.
The test aims to pinpoint weaknesses in a company's cyber security readiness, says DRS.
Risk management should play a proactive role in business, rather than a reactive one.
The Internet of Things is presenting enterprises with myriad risks on a daily basis, says DRS.
Companies need to know what information can be collected, and where and how it can be stored and transmitted, says DRS.
Traditional endpoint solutions are proving inadequate weapons in the war against online crime, says DRS.