Latest Blog Posts
December 02, 2016 Added by:Dan Ross
Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.
December 02, 2016 Added by:Brian NeSmith
Security is not achieved by implementing a product, and companies need to make sure they are actively securing their company every day.
December 01, 2016 Added by:Ionut Arghire
As part of a four-year long investigation, Europol and global partners disrupted the international criminal infrastructure platform known as “Avalanche".
November 18, 2016 Added by:Ionut Arghire
The recently discovered Medusa IRC bot used to carry out distributed denial of service (DDoS) attacks against the websites of a couple of Russian websites has emerged recently, researchers with the Russian security firm Doctor Web reveal.
November 18, 2016 Added by:Tim Prendergast
In today’s complex world of cybersecurity threats that are ever-changing and ever-evolving, it’s nearly impossible to say you’re 100 percent compliant with all standards at all times.
November 17, 2016 Added by:Steve Durbin
Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.
November 17, 2016 Added by:Peter Buttler
A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.
November 14, 2016 Added by:Alexander Polyakov
SAP’s critical patch update for November contains 16 SAP Security Notes, two rated Hot News.
November 11, 2016 Added by:Jeff Hussey
By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.
November 08, 2016 Added by:Slawek Ligier
If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.
November 05, 2016 Added by:Ionut Arghire
A severe DOM (Document Object Model) based XSS (Cross-Site Scripting) vulnerability in Wix.com could lead to an attacker gaining full control of the websites hosted on the platform, Contrast Security researchers warn.
October 25, 2016 Added by:Myk Konrad
With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.
October 20, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for October 2016 to resolve 48 vulnerabilities in SAP products, a record-breaking number of flaws.