Spring is here (at least in some parts of the world in the northern hemisphere)! The bees are buzzing, the flowers are blooming, and the accountants are working late because for those in the U.S., it’s tax season! Scammers love tax season—there is a lot of money moving around as people pay taxes and receive […]

Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques to evade detection and deceive users. This kind of malware, as mentioned in previous posts, usually arrives as an attached document within a phishing email. After the “document” is opened, it downloads the second-stage payload, […]

When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]

Can we really trust cloud computing? Or perhaps more importantly do you trust the cloud? And does the perceived lack of transparency, combined with recent negative headlines, impact future investments in cloud computing? In conjunction with the Cloud Security Alliance, we have prepared a survey to gain a better understanding of the perceived trust within […]

Automation is key to shorter response times and better containment. Breaches to the right of you, Breaches to the left of you, Breaches in front of you, Broken and plunder’d. (With apologies to Alfred, Lord Tennyson) Hopefully your security outlook is not as bleak as the ill-fated “Charge of the Light Brigade.” Sometimes it may […]