OS & Software

Cd4a401af99bbf084db76ad6044a5639

What We’re Learning about Ransomware, and How Security Is Stepping Up to the Task

November 08, 2016 Added by:Slawek Ligier

If anything is certain about the latest ransomware trends we’ve been tracking, it’s that no one is immune to an attack. Ransomware attackers don’t discriminate.

Comments  (0)

Bff69da3ab11dd09027195fd431c4b09

Exploit Kits: Infiltrating the Ad Industry with Traditional Tactics

August 11, 2016 Added by:Karl Sigler

Exploit kits are increasingly using the evil twin of an advertisement, a malvertisement, as a gateway to a web browser.

Comments  (0)

Cd4a401af99bbf084db76ad6044a5639

Don’t Be a Victim – Fight Ransomware Attacks with These Proven Steps

July 27, 2016 Added by:Slawek Ligier

There is certainly no shortage of cyber-attacks in the headlines, and none more prevalent than ransomware attacks. These bold attacks encrypt user files, then demand a ransom in exchange for decrypting the files and restoring access to the original owner.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Malvertising Hits Top Celebrity News Site

May 10, 2016 Added by:Ionut Arghire

Malvertising, the malicious activity that involves spreading malware via online advertising, has been trending up over the past few years, and 2016 might become a record-breaking year for it, Cyphort Labs researchers suggest.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes April 2016 - DoS Vulnerabilities on the Rise

April 14, 2016 Added by:Alexander Polyakov

SAP's April security patches resolve 26 vulnerabilities in SAP products, including 19 SAP Security Patch Day Notes and 7 Support Package Notes.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Malvertising Attack Hits Top Australian Classified Site

March 29, 2016 Added by:InfosecIsland News

Free classified advertising site Gumtree was hit by a malvertising attack that resulted in users being exposed to the Angler exploit kit (EK), researchers at Malwarebytes say.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report

January 05, 2016 Added by:Eduard Kovacs

Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

88150b98b01e91a6c22f9b864b066985

Keeping Data Secure: A Happy Marriage of Hardware & Software

November 12, 2015 Added by:Mark Papermaster

Dedicated hardware in the form of a secure processor enables more secure computing, whether on a PC, laptop, server, or an embedded device. The hardware provides encryption acceleration to protect data without slowing the user's experience.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Elusive HanJuan EK Drops New Tinba Version (updated)

June 25, 2015 Added by:Malwarebytes

Dutch security firm Fox-IT has identified the payload as a new version of Tinba, a well-known banking piece of malware.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked