Tag "Encryption"

Back to homepage
Software

Data Security: One type is not like the other, or is it?

Protecting corporate and customer data on all devices must be a top priority for businesses.Security threats to the enterprise today are pervasive. This is evidenced by the increasing prevalence and

Identity Theft

New Report: 30% of CEO Emails Exposed in Breaches

The phrase “new normal” usually offers little comfort — particularly when stolen secrets are in the mix.It’s true. Data breaches have become so commonplace that we’re nearly numb to them.

Software

Rise and evolution of ransomware attacks

Ransomware, malware that encrypts systems and then asks for a ransom to decrypt files and systems, has become more prevalent in recent years. In fact, two of 2017’s major cyberattacks

Industry Insights

New infosec products of the week​: November 3, 2017

Integrated security platform for automated detection and response.Fidelis Cybersecurity announced its new Fidelis Elevate automated detection and response (ADR) platform. Elevate empowers security operations teams to automatically investigate, validate, enrich

Software

Sage: Innovative Ransomware with Style

A revised version of the Sage ransomware has hit the scene, earning style points with a bright user interface and interactive ransom note.“In stark contrast to the drab payment sites

Software

The Rabid Ransomware Bunnies Behind #BadRabbit

After the drama caused by the WannaCry and NotPetya earlier this year, was there ever any doubt that a fresh ransomware campaign would emerge at some point? The answer came

IT Compliance

Huge Changes are Coming: it’s Time to Prepare Technologically for GDPR

25 May 2018 is the date that has been on everyone’s mind over the last few months. GDPR, which will enter into force in seven months’ time, is a new

Software

Vulnerability in code library allows attackers to work out private RSA keys

Researchers have discovered a security vulnerability in the Infineon-developed RSA library, which could be exploited by attackers to discover the RSA private key corresponding to an RSA public key generated

Mobile

Android DoubleLocker ransomware encrypts data, changes device PIN

A new piece of ransomware is targeting Android users. Dubbed DoubleLocker, it both encrypts users’ files and changes the device’s PIN.Lukáš Štefanko, the ESET researcher who discovered the ransomware, says

Cloud

Proving, Without a Shadow of Doubt, The Acceptability of the Public Cloud for Legal Data

By Bill Tolson, Vice President of Marketing at Archive 360 (www.archive360.com) There are a number of benefits that present a persuasive business case for attorney’s leveraging public cloud storage which