Tag "Malware"

Back to homepage
Software

Taken by Ransomware? Certain Skills Required.

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Hardware/Network

Five network security threats facing retail – and how to fight them

Digital networks are now the backbone of every retail operation. But they are also a very attractive target for cyber criminals. Paul Leybourne of Vodat International examines the key cyber

Hardware/Network

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as

Hardware/Network Mobile

Protecting a Mobile Workforce with Hybrid DNS Security

It is expected that half of the UK’s workforce will be working remotely by 2020, accessing the corporate network via mobile devices and the cloud. If true, this prediction is likely to

Software

Cryptocurrency Mining Malware Hits Over 1 Million Computers in China

By Julia Sowells Senior Information Security Specialist at Hacker Combat, Over one million computers in China have been infected by cryptocurrency mining malware resulting in hackers earning over $2 million in

Hardware/Network Software Security

How To Use The IIoT To Immunize Against Critical Infrastructure Hacks

On May 25th, the FBI recommended that all U.S. households and small businesses reboot their internet routers, due to infection by Russian malware. In March, we had reports of Russia hacking U.S.

Software

Are security professionals moving fast enough?

Anthony O’Mara, from Malwarebytes, explains to Information Age why security professionals need to move much faster to beat cyber criminals. With the increase in threats the cybersecurity industry faces, alongside

Hardware/Network

Is a UTM Appliance the Right Security Solution for Your Business?

A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. UTM appliances provide an

Software

File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods.

Software

Ransomware back in big way, 181.5 million attacks since January

SonicWall announces record numbers for malware volume, ransomware attacks, encrypted threats and chip-based attacks in the mid-year update of the 2018 SonicWall Cyber Threat Report. “Real-time cyber threat intelligence is more critical than