advanced Persistent Threats

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

Market Guide for Information-Centric Endpoint and Mobile Protection

Market Guide for Information-Centric Endpoint and Mobile Protection

In a world that emphasizes connectivity, mobility, sharing and cloud services, business information flows continuously in and out of endpoint devices. Security and risk management leaders must develop a portfolio of solutions to address different aspects of encryption and boundary defense.

50 hashes per hour

50 hashes per hour

Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.

Comprehensive data security in the cloud

Comprehensive data security in the cloud

With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.

BSides Denver 2017

BSides Denver 2017

A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.

SSL certificate is a must for websites

SSL certificate is a must for websites

A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.

Why is Ransomware a dangerous form of cyber threat?

Why is Ransomware a dangerous form of cyber threat?

Ransomware vісtіm will not be able to access his іnfоrmаtіоn.Rаnѕоmwаrе operations succeed bесаuѕе thеу capitalize оn fear, whісh ultіmаtеlу fоrсеѕ vісtіmѕ to dо something іrrаtіоnаl ѕuсh аѕ paying суbеrсrіmіnаlѕ.

Load More