IBM yesterday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android ...
Tags: IBM, Fiberlink, mobile-security, strategy, lynchpin
IBM is to acquire Dublin-based analytics software provider The Now Factory. Financial terms were not disclosed. Further reading IBM to splash $1bn on Linux for cloud computing and big data US government agency selects IBM in 10 year ...
Tags: Analytics Firm, IBM
US government agency, the Department of Interior (DOI) has selected IBM in a deal worth up to $1bn (£600m) as it bids to shift its IT into the cloud. The contract is an "indefinite delivery/indefinite quantity" (IDIQ) contract ...
Tags: Cloud Hosting Services, IBM
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. The financial terms of the proposed acquisition were not disclosed. With offices in Boston and Tel Aviv, ...
IBM is to acquire security firm Trusteer, whose software aims to help protect organisations against financial fraud and advanced security threats. Financial terms were not disclosed. Further reading IBM acquires cloud computing firm CSL ...
Tags: IBM, Financial Security
Prison sentences for hacking and cyber crime are set to rise across Europe if a new draft directive becomes law, as the EU looks to combat cyber espionage and cyber attacks against critical national infrastructure. A draft directive set ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
With the previously $40,000 Carberp Trojan's source code now freely available, experts expect exceptionally destructive variants of the malware to flow onto the Internet. Carberp-based malware is expected to take advantage of the bootkit ...
Tags: Computer Products, software
Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in the past. Critical vulnerabilities in software programs being actively exploited by hackers should be made public seven days ...
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. The Master Boot Record (MBR) is a boot sector that ...
Tags: Computer Products, software
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages