A new study of the evolving cyber threat landscape identifies a half-dozen areas likely to be high-profile targets in the immediate future, including something called "trust infrastructure."
Today's systems, policies and procedures were developed to lock information down, not to share it securely. Interoperable credentials could be the key.
New technology doesn't define the cyber threat landscape, say researchers crunching numbers from eight years of Verizon Data Breach Investigation Reports.
The Trojan Upclicker evades automated detection tools by monitoring mouse activity to make sure it is dealing with a human before jumping into action.
Despite taking the safe road by predicting that threats for 2012 would be a lot like those of 2011, the CyberEye still managed to only bat about .500.
With security information limited by screen size, even experts can't tell when they're visiting malicious sites, according to a Georgia Tech study.
RIM's long-awaited BlackBerry 10 OS contains a blacklist of passwords that users will not be allowed to use. Maybe it's not a great idea, but it's a good one.
Browsers are getting better at blocking phishing sites, but phishers are getting more nimble at keeping their sites on the move.
Despite the growing number of malicious apps for Android devices, researchers at Georgia Tech found a surprisingly low rate of infections on phones in the United States.
DOD wants a baseline of security standards for defending civilian critical infrastructure and clear lines of authority for sharing information across sector boundaries.