All the latest blog posts from the most relevant cyber security companies in the business.

Throughout my career, I have seen first-hand the real world impacts that a breach in cyber security can have on customers, businesses and communities. With cyber attacks growing in number and sophistication, today security is a requirement of “doing business”, however, many companies and organizations lack the knowledge and resources to secure their platforms, products…

The introduction of a new generation of connected, intelligent devices into the workplace has helped businesses become more productive, serve customers more efficiently and expand into new markets. But as more smart devices join the burgeoning Internet of Things (IoT), the transition has scrambled the historical notion of the corporate endpoint. We’ve moved beyond the…

We have encountered a new and highly prevalent type of Android malware (detected as Android.Sockbot) posing as apps on Google Play and later adding compromised devices into a botnet. So far we have identified at least eight such apps, with an install base ranging from 600,000 to 2.6 million devices. This malware appears primarily targeting…

Fake emulators for newly released Nintendo console used as bait to get users to fill out survey scams and download potentially unwanted applications. Over the last few weeks, scammers have been trying to dupe users into believing that a software emulator exists for the Nintendo Switch, the company’s newest console that was released on March…

A newly discovered zero-day vulnerability in Adobe Flash Player is being exploited by attackers in the wild. Adobe released a Security Bulletin (APSB16-36) yesterday which patches the vulnerability (CVE-2016-7855). The critical vulnerability affects Adobe Flash Player 23.0.0.185 and earlier versions for the following operating systems: Windows Mac Linux Chrome OS According to Adobe, an exploit…

Over the past month, Symantec has blocked almost 8 million spam emails relating to the US presidential election. The volume of spam has increased steadily during that period, reflecting rising interest in the election as the November 8 polling day draws near. The trend reflects one of the tactics most commonly used by spam groups….

New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom. Previous versions of these threats locked the screen and used a hardcoded passcode, but analysts were able to reverse engineer the code to provide victims with the passcode to unlock their devices. Attackers have also combined a…