Tag "Malware"

Back to homepage
IT Compliance

Authentication in the Age of GDPR

It’s been over a year since the enforcement of the long-planned General Data Protection Regulation (GDPR) began, marking the start of a new regulatory era for data management. GDPR impacts

Hardware/Network

Over 800K Systems Remain Vulnerable to Bluekeep

Over 805,000 computers around the world are still vulnerable to the critical Bluekeep vulnerability, which experts have warned could create a worm-like threat worse than WannaCry. Security firm BitSight claimed that, as

Cloud

93% of Orgs Worry About Cloud Security

Two reports published independently of each other found that the majority of organizations are moderately to extremely concerned about the state of cloud security. In Guardians of the Cloud, the 2019

Hardware/Network

Cybersecurity as a key challenge in realising India’s digital economy potential: ESET survey

​57% of respondents also indicated spending more than three hours online per day, suggesting a high degree of exposure to cyberthreats. As smartphone adoption grows, consumers still show apathy towards

Software

Anatomy of a ransomware attack: How attackers gain access to unstructured data

Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank

Software

Cybercriminals leverage malicious Office docs, Mac malware, web app exploits

There’s been a 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. A new Watchguard report also found that cybercriminals are leveraging a wide array

Software

How past threats and technical developments influence the evolution of malware

If we want to anticipate how malware will evolve in the near future, we have to keep two things in mind: past threats and current technical developments. “The evolution of

Identity Theft

What is digital ad fraud and how does it work?

Ad fraud can help fraudsters to generate revenue for themselves through fake traffic, fake clicks and fake installs. It can also help the cybercriminals to deploy malware on users’ computers.

Software

How to Secure Your CMS Website, Even if You Aren’t an Expert

Any time you visit a website, there’s about a 50/50 chance it was built on a content management system such as WordPress, Drupal, or Joomla. These platforms make building and maintaining an

Artificial Intelligence

What Should Frighten us about AI-Based Malware?

Of all the cybersecurity industry’s problems, one of the most striking is the way attackers are often able to stay one step ahead of defenders without working terribly hard. It’s