network Security

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

DDoS attacks in Q2 2017

DDoS attacks in Q2 2017

Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.

Microsoft Cloud App Security overview

Microsoft Cloud App Security overview

Know more about Microsoft Cloud App Security—a comprehensive cloud-delivered service providing deeper visibility, comprehensive controls, and improved security for cloud applications.

Market Guide for Information-Centric Endpoint and Mobile Protection

Market Guide for Information-Centric Endpoint and Mobile Protection

In a world that emphasizes connectivity, mobility, sharing and cloud services, business information flows continuously in and out of endpoint devices. Security and risk management leaders must develop a portfolio of solutions to address different aspects of encryption and boundary defense.

50 hashes per hour

50 hashes per hour

Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.

Detecting and Responding to a Ransomware Attack

Detecting and Responding to a Ransomware Attack

Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.

Load More