Tag "Malware"

Back to homepage
Hardware/Network

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Software

Analysis of half-a-billion emails reveals malware-less email attacks are on the rise

FireEye analyzed over half-a-billion emails from 1H 2018, and found that 32% of email traffic seen in the first half of 2018 was considered ‘clean’ and actually delivered to an

Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Software

Building an effective cyber defence against polymorphic malware

Jan Van Vliet, VP and GM EMEA at Digital Guardian, goes through the best practices to protect against polymorphic malware.Recent research suggests as much as 97% of all malware infections

Software

Password inadequacy remains a top threat

New research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two days. This

Software

A guide to cyber attacks: Phishing – Part 2

Information Age’s guide to cyber attacks continues with an examination of types of phishing attacksPhishing typically involves attackers obtaining a victim’s personal information. This can include log-in details and bank

Software

A guide to cyber attacks: Malware – Part 1

As part of a three part guide on cyber attacks, we begin by exploring existing types of malware.Malware, short for malicious software, refers to any malicious coding that can infiltrate

Cloud

5 tips for better cloud security

There’s no doubt that widespread adoption of the cloud has enabled collaboration on a much greater scale, driving innovation and creativity. Distributed workforces can work harmoniously, IT departments can offload

Software

LuckyMouse Group is back and using a legitimate certificate to sign Malware

The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor –

Industry Insights

Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?

A recent report by Forrester spotlighted a growing trend in infosec point solution purchasing: the majority of respondents dealt with the challenge of point-tool sprawl. In fact, 60% of survey respondents said