Cybersecurity is everyone’s responsibility. In a world where the cyberthreat landscape continues growing rapidly in size and sophistication, that’s the key message driving the focus of 2019’s National Cybersecurity Awareness Month (NCSAM) this October. Held every October, NCSAM is a collaborative effort between government and the private sector to promote cybersecurity awareness and the need…
Let’s face it. No one likes to air their dirty laundry in public, especially if your job is in the area of cyber security. Be that as it may, research suggests that those who acknowledge and learn from their security breaches and share the insights could actually be a benefit to a company – not…
Symantec has uncovered 152 malicious Android apps being circulated online that claim to provide free data boosts for Jio customers. The apps masquerade as apps from Reliance Jio Infocomm Limited. Reliance Jio Infocomm Limited, also known as Jio, is the largest 4G network in India, with more than 300 million subscribers. These 152 APKs were…
Early this year, when an executive at a hospital called our Incident Response (IR) team, he had yet to realize that his organization was confronting an active ransomware attack. Symantec Endpoint Protection (SEP) and his internal team had flagged as suspicious some data that was marked with a four-letter file name, he explained, and multiple…
It’s hard to know who tracks the value of cryptocurrencies more closely. Is it the investors who own the virtual coins, or the criminals who hijack computing power to mine them? For their part, the criminals clearly do follow cryptocurrency values. Symantec, as detailed in its annual Internet Security Threat Report (ISTR), tracked a decline…
Imagine this scenario: As you you’re driving down the highway at 65 miles an hour, a hacker gains control of your car, then sends you into incoming traffic. Here’s the good news: It’s very unlikely that will ever happen to you personally. Here’s the bad news: It could still happen, and, if it happens, attackers…
Symantec, NH-ISAC partner on blended threat workshop series as healthcare industry deals with alarming rise in number of incidents. It sounds like a nightmare: A targeted piece of malware infects computers and devices, temporarily shutting down critical technologies used in the healthcare community. As the malware begins to become contained, a natural disaster hits the…
The preinstalled and versatile Windows PowerShell has become one of the most popular choices in cyber criminals’ arsenals. We have observed an increase of 661 percent in computers where malicious PowerShell activity was blocked from the second half of 2017 to the first half of 2018—a clear indication that attackers are still growing the use…
The adoption of the public cloud is driving a fundamental change in the way organizations connect remote users and distributed sites to their networks and applications. But as we’ve seen during other great times of change, tech transitions are tricky and always raise new security concerns. These are the security concerns of the Cloud Generation….
Experience is a valuable teacher, especially when you’re able to learn lessons from others who have taken similar journeys. That’s why we recently polled some of our most successful mobile security customers. They had valuable stories to share about the process they underwent evaluating and implementing mobile security solutions. We wanted to know the backstory:…