Asprox botnet, a long-running nuisance, disappears
The Asprox botnet, whose malware-spamming activities have been followed for years by security researchers, appears to be gone.
The Asprox botnet, whose malware-spamming activities have been followed for years by security researchers, appears to be gone.
Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.
A new family of Android malware adds insult to injury by making users pay for the data-stealing application.
<a href="http://www.networkworld.com/article/2857702/ethernet-switch/cisco-lawsuits-aside-arista-forges-ahead-with-eos.html">Arista Networks</a> this week unveiled what essentially is a centralized controller for its data center and cloud switches.
LightCyber is upgrading its endpoint detection and remediation platform so when it discovers bad behavior on the network it can also identify the machine and exact process that's causing it, then shut the malware down.
Corporate IT security pros need to consider the Internet of Things as a new and dangerous attack vector oh, and we all should be particularly worried about the safety of our cars, says the top executive at Palo Alto Networks.
Network visualization and risk assessment vendor RedSeal is re-launching with new capabilities, executives and funding that will be used to hire more engineers and boost its channel partners.
Palo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly resourceful, dedicated adversaries.
Nearly half of Android devices are vulnerable to an attack that could replace a legitimate app with malicious software that can collect sensitive data from a phone.
Chinese smartphone maker Coolpad has built an extensive "backdoor" into its Android devices that can track users, serve them unwanted advertisements and install unauthorized apps, a U.S. security firm alleged today.
A lot of businesses trust cloud sync-and-store provider Box, but they trust a lot of other solutions, too, for things like identity, data loss protection and digital rights management.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
Researchers at Palo Alto Networks said they've discovered an impressive malware attack against Apple devices, which for now appears to be limited to users of a Chinese application store.
Security services startup Sentrix mirrors customer Web sites in Amazon Web Services and Azure clouds in order to dynamically expand site resources during distributed denial of service attacks and keep the sites running until attackers exhaust their resources, give up or move on to easier targets.
Three security specialists discuss the best ways to secure corporate networks and educate users about the risks of cyber attacks.