Bit9 has teamed with FireEye and Palo Alto Networks, which each have sandboxing technologies, in order to share information related to zero-day attack code.
A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye.
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye.
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer.
The security technology called "sandboxing" aims at detecting malware code by subjecting it to run in a computer-based system of one type of another to analyze it for behavior and traits indicative of malware. Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline.
Though still privately held, FireEye is getting plenty of attention right now because its anti-malware sandboxing technology is something a number of other vendors want to emulate -- and FireEye's growing commercial success is inching it toward possibly going public later this year.
Apple on Monday patched Java 6 for OS X, following Oracle's lead and quashing a browser plug-in vulnerability that hackers have been exploiting.
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks.
Sign up now »
Both a challenge and solution are presented here for deploying equipment offsite in co-location sites or the cloud.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- Growing mobile malware threat swirls (mostly) around Android