Tag "Malware"

Back to homepage
Industry Insights

Security priorities are shifting in response to increased cybersecurity complexity

The increased complexity of the IT environment, combined with increasingly sophisticated attacks and a rapidly evolving threat landscape, is causing organizations to invest more money in cybersecurity and start to

Hardware/Network

IoT malware sees major rise

Not even your washing machine is safe from new threats, Kaspersky warns. The number of malware targeting Internet of Things (IoT) devices is ‘snowballing’, Kaspersky Lab’s newest report claims.The company’s

Software

A Smarter Approach to Security Will Reduce the Risk of Malware

Despite the cybersecurity industry advancing at a promising rate, malware continues to plague organizations. In fact, it was found that the majority of data breaches have happened after a malware infected attachment

Software

Maliciuos hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on

Hardware/Network

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Software

Analysis of half-a-billion emails reveals malware-less email attacks are on the rise

FireEye analyzed over half-a-billion emails from 1H 2018, and found that 32% of email traffic seen in the first half of 2018 was considered ‘clean’ and actually delivered to an

Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Software

Building an effective cyber defence against polymorphic malware

Jan Van Vliet, VP and GM EMEA at Digital Guardian, goes through the best practices to protect against polymorphic malware.Recent research suggests as much as 97% of all malware infections

Software

Password inadequacy remains a top threat

New research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two days. This

Software

A guide to cyber attacks: Phishing – Part 2

Information Age’s guide to cyber attacks continues with an examination of types of phishing attacksPhishing typically involves attackers obtaining a victim’s personal information. This can include log-in details and bank