Malware

McAfee Total Protection vs. Norton Security Premium

McAfee and Norton are two of the best-known names in PC security. How do their latest top-level suites match up?

37 percent of organizations are impacted by cryptomining: Report

The first instalment of the 2019 Security Report reveals the key malwaretrends and techniques observed by Check Point researchers during the past year.

Spear phishing: Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

Temporary micropatch available for zero-day Windows exploit

A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix.

Coin mining malware can uninstall Tencent, Alibaba cloud security

A coin mining malware developed by threat actor Rocke has been found to have the ability to uninstall five different cloud security protection and monitoring products developed by Tencent Cloud and Alibaba Cloud.

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection.

How H-Energy tackled emerging threats with an agile, scalable security solution

From safeguarding a massive mobile workforce to deploying an agile, scalable security solution, here’s how Vikas Gupta, CIO at H-Energy future-proofed cybersecurity at his organization.

Partner Content
Education Service Center Region 11 Protects Student Data with VMware NSX Data Center

Education Service Center Region 11 serves 70,699 educators and almost 600,000 students across 10 urban and rural counties.

Authentication, encryption and AI – the key components in securing connected cars

The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.

Cybersecurity trends that 2019 might hold for us

With the cyber security industrial complex in full swing and good business for all the major players, from governments and state sponsored groups, to criminal attackers and the vendors as well as their shareholders, we wonder what horrors this dystopian hell world will spew forth next.

Experian exec says biometrics won’t save you from mobile hacks

Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.

Live hacking to rise in 2019: Report

‘Live hacking’ will become more popular as attacks that originate in this way don’t require traditional software packages that can be detected or destroyed.