Tag "Ransomware"

Back to homepage
Software Security

Artificial Intelligence Can Drive Ransomware Attacks – Information Security Buzz

Artificial intelligence has become a highly competitive industry that is expanding rapidly thanks to the investments made by the high-tech corporations and state governments worldwide. The prospects of using the

Software

Why 2017’s Phishing Attacks Teach Us All to Beware – Infosecurity Magazine

At the end of 2016, we claimed it was the year that phishing went mainstream. Yet the first half of 2017 has seen the main ‘stream’ turned into a torrent.In

Software

The three least effective enterprise security measures

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will always be exploitable.Understandably,

Software

Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach.The study found that strong

Software

Hackers backdoored CCleaner, likely affecting millions of users

Legitimately signed but backdoored versions of the popular CCleaner utility were available for download from the developer’s Web site and servers for nearly a month, Cisco Talos researchers have discovered.It

Software

Cybercriminals deploying assortment of banking Trojans and ransomware

Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact Index.The Zeus, Ramnit and Trickbot banking

Cloud

Most cloud services still not GDPR-ready – Help Net Security

With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding little change

Industry Insights

Don’t let misplaced fear stifle innovation | ITProPortal

The famous author, James Joyce, once said: A man’s mistakes are his portals of discovery. That’s true in life and when it comes to security. After 20 years in the

BYOD/Big Data

Solving Cyber Security Quagmire Through The Prism Of Big Data

It would not be an over statement to say that widespread cyber attacks crippling global businesses has become the new normal. The speed and scale of the recent ransomware attacks

Software

Health & fitness industry: Time to take action on data security risks | ITProPortal

Given the volume and extent of personal and financial information routinely collected by leisure operators, our industry is not only a soft target but a particularly vulnerable one.There is now