Tag "software"

Back to homepage
Software

The Security Nightmare of Formjacking

Formjacking has hit the headlines recently, with malicious actors employing the technique to source valuable personal data. The concept of formjacking was behind the notorious Magecart attack, which claimed high

Software

Phishing remains major threat to businesses

Businesses are still facing a large-scale threat from phishing campaigns, despite many saying they have upped email security in recent months. New research from Cofense has found that a huge proportion of

Software

Growing Reliance on Open Source Libraries Leaves Many Companies Vulnerable

Organizations are becoming increasingly dependent on open source libraries (OSLs) to develop code for software and websites. However, Jing Xie, senior threat intelligence researcher for Venafi, warns that the growing

Software

New Mac Malware Steals Cookies, Cryptocurrency & Computing Power

Dubbed CookieMiner on account of its cookie-stealing capabilities, this newly discovered malware is believed to be based on DarthMiner, another recently detected Mac malware that combines the EmPyre backdoor and

Software

Matrix Ransomware: A Threat to Low-Hanging Fruit

In its 2019 Threat Report, Sophos predicted a rise in targeted ransomware attacks. According to new research, Matrix, a copycat targeted ransomware that is flying under the radar, is one such threat that

Software

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes

Software

Burned malware returns, says Cylance report: Is Hacking Team responsible?

Burning malware is like Hercules fighting the nine-headed Hydra. For every head he cuts off, two more grow back in its place. That’s the lesson from a new report by

Hardware/Network

What is the Standard for IoT Security?

The number of IoT products for consumers is growing rapidly. You can use them to adjust your heating or lighting, control access to your home, monitor your baby and keep

Hardware/Network

Securing your network in the IoT revolution

Instituting a comprehensive device management plan is essential to locking down Shadow IT at your organisation. The relationship between network security and the Internet of Things (IoT) has never been

Identity Theft

How AI Can Help Prevent Data Breaches in 2018 and Beyond

Artificial intelligence startups are tackling four key areas that will help companies avoid becoming the next Equifax.Equifax’s stunning data breach is a major headache for some 145 million Americans who