ITworld Endpoint Security http://www.itworld.com/taxonomy/term/27/all en AutoIt scripting increasingly used by malware developers http://www.itworld.com/security/355462/autoit-scripting-increasingly-used-malware-developers AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and Bitdefender.<p><a href="http://www.itworld.com/security/355462/autoit-scripting-increasingly-used-malware-developers" target="_blank">read more</a></p> http://www.itworld.com/security/355462/autoit-scripting-increasingly-used-malware-developers#comments Endpoint Security Security News Tue, 07 May 2013 12:35:39 +0000 IDGNS staff 355462 at http://www.itworld.com Antivirus is ailing: Here are 5 firms ready to replace it http://www.itworld.com/security/355151/antivirus-ailing-here-are-5-firms-ready-replace-it AV companies have been at war with the bad guys for much of the last two decades. And guess what? The bad guys won. Now that the days of antivirus software being in the front line of defense against malware are over, what companies are ready to step in and take up arms against sophisticated attacks and malware? Here are five to keep your eye on. <p><a href="http://www.itworld.com/security/355151/antivirus-ailing-here-are-5-firms-ready-replace-it" target="_blank">read more</a></p> http://www.itworld.com/security/355151/antivirus-ailing-here-are-5-firms-ready-replace-it#comments Endpoint Security Enterprise Software IT Management Security Software Feature Fri, 03 May 2013 19:51:14 +0000 jnaze 355151 at http://www.itworld.com Researchers find malware targeting online stock trading software http://www.itworld.com/security/353047/researchers-find-malware-targeting-online-stock-trading-software Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.<p><a href="http://www.itworld.com/security/353047/researchers-find-malware-targeting-online-stock-trading-software" target="_blank">read more</a></p> http://www.itworld.com/security/353047/researchers-find-malware-targeting-online-stock-trading-software#comments Endpoint Security Security News Thu, 18 Apr 2013 15:54:10 +0000 IDGNS staff 353047 at http://www.itworld.com Researchers find APT malware that monitors mouse clicks to evade detection http://www.itworld.com/endpoint-security/350654/researchers-find-apt-malware-monitors-mouse-clicks-evade-detection Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer.<p><a href="http://www.itworld.com/endpoint-security/350654/researchers-find-apt-malware-monitors-mouse-clicks-evade-detection" target="_blank">read more</a></p> http://www.itworld.com/endpoint-security/350654/researchers-find-apt-malware-monitors-mouse-clicks-evade-detection#comments Endpoint Security Security News Tue, 02 Apr 2013 14:42:04 +0000 IDGNS staff 350654 at http://www.itworld.com Ransomware leverages victims' browser histories for increased credibility http://www.itworld.com/security/350488/ransomware-leverages-victims-browser-histories-increased-credibility The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher.<p><a href="http://www.itworld.com/security/350488/ransomware-leverages-victims-browser-histories-increased-credibility" target="_blank">read more</a></p> http://www.itworld.com/security/350488/ransomware-leverages-victims-browser-histories-increased-credibility#comments Endpoint Security Security News Mon, 01 Apr 2013 15:45:51 +0000 IDGNS staff 350488 at http://www.itworld.com Most Java-enabled browsers vulnerable to widespread Java exploits, Websense says http://www.itworld.com/security/349798/most-java-enabled-browsers-vulnerable-widespread-java-exploits-websense-says Most browser installations use outdated versions of the Java plug-in that are vulnerable to at least one of several exploits currently used in popular Web attack toolkits, according to statistics published Monday by security vendor Websense.<p><a href="http://www.itworld.com/security/349798/most-java-enabled-browsers-vulnerable-widespread-java-exploits-websense-says" target="_blank">read more</a></p> http://www.itworld.com/security/349798/most-java-enabled-browsers-vulnerable-widespread-java-exploits-websense-says#comments Endpoint Security Security News Tue, 26 Mar 2013 19:23:01 +0000 IDGNS staff 349798 at http://www.itworld.com Researchers uncover vSkimmer malware targeting point-of-sale systems http://www.itworld.com/security/349352/researchers-uncover-vskimmer-malware-targeting-point-sale-systems A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee.<p><a href="http://www.itworld.com/security/349352/researchers-uncover-vskimmer-malware-targeting-point-sale-systems" target="_blank">read more</a></p> http://www.itworld.com/security/349352/researchers-uncover-vskimmer-malware-targeting-point-sale-systems#comments Data Protection Endpoint Security Security News Fri, 22 Mar 2013 11:56:59 +0000 IDGNS staff 349352 at http://www.itworld.com Researchers find TeamViewer-based cyberespionage operation http://www.itworld.com/security/349200/researchers-find-teamviewer-based-cyberespionage-operation Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and former Soviet Union states.<p><a href="http://www.itworld.com/security/349200/researchers-find-teamviewer-based-cyberespionage-operation" target="_blank">read more</a></p> http://www.itworld.com/security/349200/researchers-find-teamviewer-based-cyberespionage-operation#comments Endpoint Security Security News Thu, 21 Mar 2013 14:28:48 +0000 IDGNS staff 349200 at http://www.itworld.com Rethinking Your Enterprise Security - Critical Priorities to Consider http://www.itworld.com/security/348937/rethinking-your-enterprise-security-critical-priorities-consider <!--paging_filter--><p> Forward-thinking enterprises realize they need to focus on a sustainable approach to security and risk management-one that is designed to address the new wave of vulnerabilities that prevail.</p> <p><a href="http://www.itworld.com/security/348937/rethinking-your-enterprise-security-critical-priorities-consider" target="_blank">read more</a></p> Endpoint Security Security Wed, 20 Mar 2013 02:00:15 +0000 348937 at http://www.itworld.com Researchers find vulnerability in EA's Origin platform http://www.itworld.com/personal-tech/348525/researchers-find-vulnerability-eas-origin-platform Users of Origin, the game distribution platform of Electronic Arts (EA), are vulnerable to remote code execution attacks through origin:// URLs, according to two security researchers.<p><a href="http://www.itworld.com/personal-tech/348525/researchers-find-vulnerability-eas-origin-platform" target="_blank">read more</a></p> http://www.itworld.com/personal-tech/348525/researchers-find-vulnerability-eas-origin-platform#comments Endpoint Security Personal Tech Security Software News Fri, 15 Mar 2013 23:52:58 +0000 IDGNS staff 348525 at http://www.itworld.com 3G and 4G USB modems are a security threat, researcher says http://www.itworld.com/networking/348472/3g-and-4g-usb-modems-are-security-threat-researcher-says The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia.<p><a href="http://www.itworld.com/networking/348472/3g-and-4g-usb-modems-are-security-threat-researcher-says" target="_blank">read more</a></p> http://www.itworld.com/networking/348472/3g-and-4g-usb-modems-are-security-threat-researcher-says#comments Endpoint Security Hardware Networking Security News Fri, 15 Mar 2013 16:21:55 +0000 IDGNS staff 348472 at http://www.itworld.com Kaspersky Internet Security 2013 bug can lead to system freeze http://www.itworld.com/security/347414/kaspersky-internet-security-2013-bug-can-lead-system-freeze Kaspersky Lab&#039;s Internet Security 2013 product contains a bug that can be exploited remotely, especially on local networks, to completely freeze the OS on computers running the software.<p><a href="http://www.itworld.com/security/347414/kaspersky-internet-security-2013-bug-can-lead-system-freeze" target="_blank">read more</a></p> http://www.itworld.com/security/347414/kaspersky-internet-security-2013-bug-can-lead-system-freeze#comments Endpoint Security Security News Thu, 07 Mar 2013 17:00:00 +0000 IDGNS staff 347414 at http://www.itworld.com Following hack, Evernote speeds move to two-factor authentication http://www.itworld.com/endpoint-security/346934/following-hack-evernote-speeds-move-two-factor-authentication Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.<p><a href="http://www.itworld.com/endpoint-security/346934/following-hack-evernote-speeds-move-two-factor-authentication" target="_blank">read more</a></p> http://www.itworld.com/endpoint-security/346934/following-hack-evernote-speeds-move-two-factor-authentication#comments Data Protection Endpoint Security Security News Wed, 06 Mar 2013 02:31:29 +0000 IDGNS staff 346934 at http://www.itworld.com Cybercriminals using digitally signed Java exploits to trick users http://www.itworld.com/endpoint-security/346732/cybercriminals-using-digitally-signed-java-exploits-trick-users Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.<p><a href="http://www.itworld.com/endpoint-security/346732/cybercriminals-using-digitally-signed-java-exploits-trick-users" target="_blank">read more</a></p> http://www.itworld.com/endpoint-security/346732/cybercriminals-using-digitally-signed-java-exploits-trick-users#comments Endpoint Security Security News Tue, 05 Mar 2013 17:52:00 +0000 IDGNS staff 346732 at http://www.itworld.com Cyber's Strangelovian moment? http://www.itworld.com/security/344818/cybers-strangelovian-moment A steady drumbeat of news about sophisticated cyber attacks against our government and leading institutions has attendees at this year&#039;s RSA conference in a fever. And that may be bad for security. <p><a href="http://www.itworld.com/security/344818/cybers-strangelovian-moment" target="_blank">read more</a></p> http://www.itworld.com/security/344818/cybers-strangelovian-moment#comments Data Center Data Protection Endpoint Security Government Mobile & Wireless Networking Security News apt cybersecurity RSA Conference Tue, 26 Feb 2013 02:03:22 +0000 paulfroberts 344818 at http://www.itworld.com