A former Expedia IT professional admitted on Monday to illegally trading on secrets he discovered by hacking his own company’s senior executives. Jonathan Ly stole passwords and infiltrated devices of Expedia’s (EXPE) chief financial officer and head of investor relations,

OSquery, an open-source framework created by Facebook that allows organizations to look for potential malware or malicious activity on their networks, was available for Mac OS X and Linux environments until today. But now the social network has announced that

Microsoft is putting Edge in a virtual machine to protect users from malware, viruses, phishing and zero-days. Microsoft has developed a new update for its Windows 10 operating system that will place the Edge web browser inside a virtual machine

The problem with today’s endpoints is that they are so varied:  a mix of desktop PCs, laptops and netbooks, frequently with different versions of OS and applications being used across organisations’ estates. This variety of endpoints also means that security

While automated attacks by a networked army of computers aren’t a new problem, the methods that botnets are using are getting more complex. They’re also increasing in number with the latest cybercrime report from ThreatMetrix suggesting that the number of

Advanced Persistent Threats are a constant concern for the IT Director, the CIO and, lately, the entire C-Suite. Every day, we learn about how a new piece of malware has penetrated a supposedly protected IT environment. How does the APT

Before we get to best practices in botnet detection, let’s do a quick review of exactly what a botnet is. One of the most powerful ways to pursue any computationally challenging task is to leverage the untapped processing power of

“AMPing” up its security capabilities, Cisco integrates technology from its 2013 acquisition of SourceFire into its portfolio. Cisco revealed Feb. 24 that it is adding critical new security capabilities to its portfolio, thanks to technology gained via the $2.7 billion