phishing

Nigerian phishing: Industrial companies under attack

Nigerian phishing: Industrial companies under attack

In October 2016, Kaspersky Lab products detected a surge in malware infection attempts on the computers of its customers who had industrial control systems installed. This was just part of the bigger story.

What makes identity-driven security the new age firewall

What makes identity-driven security the new age firewall

Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.

Detecting and Responding to a Ransomware Attack

Detecting and Responding to a Ransomware Attack

Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.

Comprehensive data security in the cloud

Comprehensive data security in the cloud

With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.

BSides Denver 2017

BSides Denver 2017

A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.

Ztorg: Money for infecting your smartphone

Ztorg: Money for infecting your smartphone

Large Scale network promotes applications infected with the Ztorg Trojan through advertising campaigns. Infected viruses are gaining thousands of new users each day!

Dridex: A History of Evolution

Dridex: A History of Evolution

The damage done by Dridex banking Trojan was estimated at over $40 million. The ongoing evolution of the malware shows that cybercriminals are not about to bid farewell to this.

WannaCry mistakes that can help you restore files after infection

WannaCry mistakes that can help you restore files after infection

It is clear that the ransomware developers have made a lot of mistakes and the code quality is very low.
 
If you were infected with WannaCry ransomware there is a good possibility that you will be able to restore a lot of the files on the affected computer

SSL certificate is a must for websites

SSL certificate is a must for websites

A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.

Why is Ransomware a dangerous form of cyber threat?

Why is Ransomware a dangerous form of cyber threat?

Ransomware vісtіm will not be able to access his іnfоrmаtіоn.Rаnѕоmwаrе operations succeed bесаuѕе thеу capitalize оn fear, whісh ultіmаtеlу fоrсеѕ vісtіmѕ to dо something іrrаtіоnаl ѕuсh аѕ paying суbеrсrіmіnаlѕ.

Load More