FireEye said Monday it has acquired Invotas, a company that develops a platform that helps administrators respond faster to security incidents.
Google researchers found a software flaw in several models of FireEye's security appliances which they say could give a cyberattacker full access to a company's network.
FireEye says it has discovered a type of malware designed to steal payment card data that can be very difficult to detect and remove.
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
A small group of Nigerian scammers is using more sophisticated methods to defraud mostly Asian businesses, including buying exploit kits and malware from experienced coders, according to a new report from FireEye.
The leaked files from surveillance software maker Hacking Team have proven to be a great resource for cyberespionage groups, which have used at least two Flash Player exploits from the company's arsenal.
Recently breached surveillance software maker, Hacking Team, had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting Internet users at risk.
The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's F...
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.
The U.S. Securities and Exchange Commission is concerned that data stolen from companies in cyberattacks is being used to conduct what effectively is insider trading, Reuters reported on Tuesday.
Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security vendor FireEye.
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 Mazda MX-5 (2016) review: Absolute driving purity
- 3 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 4 LG 55EG960T OLED UHD TV
- 5 Panasonic Viera UHD TV review: good hardware, fragmented software
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- UCLA just open-sourced a powerful new image-detection algorithm
- Microsoft lets cautious users try more of Windows 10’s leading edge
- A new IoT gateway design could be Bluetooth's ticket to the cloud
- Data science achieves the ultimate ROI: A craft beer
- SAP slaps patch on leaky factory software
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCSAP CRM Specialist- ABAPACT
- FTApplication Support AnalystVIC
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCService ModellerNSW
- FTOracle System Integration Engineer - CANBERRASA
- CCContract Analyst Programmer (MS.Net/Visual Basic) 160129/AP/vtdAsia
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- CCMaster SchedulerVIC
- FTSecurity ArchitectWA
- CCSenior Information Security SpecialistNSW
- FTProject Manager | Permanent position | NV1 NV2 cleared | Defence | Great cultureACT
- CCCisco Network EngineerNSW
- CCFront End Developer - MelbourneVIC
- CCMultiple Senior Business Analyst opportunitiesSA
- CCSenior Business Analyst, Online Gaming SystemsNSW
- CCSolution Architect - Biomedical - South Australia locationSA
- CCInformatica ExpertNSW
- CCDBA (Oracle/SQL)NSW
- CCHelpdesk SupportNSW
- CCSenior Business Analyst, Enterprise Software SolutionNSW
- CCIT Service Improvement SpecialistNSW
- CCUser Experience Designer - BaselineACT
- CCBusiness Project Manager - Transformation ProgramNSW