Year: 2016

Powerful backdoor/rootkit found preinstalled on 3 million Android phones

Almost three million Android phones, many of them used by people in the US, are vulnerable to code-execution attacks that remotely seize full control of the devices, researchers said Thursday. Until recently, the flaw could have been exploited by anyone who took the time to obtain two Internet domains that …

Powerful backdoor/rootkit found preinstalled on 3 million Android phonesRead More »

Malware downloaded every 81 seconds, says new Check Point security report

A new report from Check Point claims that the average day in an enterprise organization is rife with malware and malicious applications. A new report, released by security company Check Point on Tuesday, claims that some form of known malware is downloaded every 81 seconds in an enterprise organization. The …

Malware downloaded every 81 seconds, says new Check Point security reportRead More »

Microsoft adds new cloud-based tools and machine learning features to Office apps

Microsoft Word, Outlook, and PowerPoint are getting intelligent updates to help improve productivity and performance with the addition of machine learning and natural language processing. On Tuesday, Microsoft announced that it was updating a host of its Office 365 applications with cloud-based intelligent services that it says will “save you …

Microsoft adds new cloud-based tools and machine learning features to Office appsRead More »

Cloud computing: We’ll never be all in, say most companies

In a new report from SolarWinds, 92% of companies say adopting cloud is critical to long-term success. But, most don’t think they’ll ever be fully cloud. On Tuesday, IT management software provider SolarWinds released its annual report titled IT Trends Report 2016: The Hybrid IT Evolution, detailing some interesting trends …

Cloud computing: We’ll never be all in, say most companiesRead More »

A troubling trajectory of malware and ransomware targeting OS X and iOS

In recent years, we’ve seen attitudes toward computer security shift from “let’s wait and see” to “protect yourselves at all costs.” And while security has been thrust center stage in all arenas, from healthcare to ecommerce to higher education, there are still entities becoming compromised to greater degrees every few …

A troubling trajectory of malware and ransomware targeting OS X and iOSRead More »