Phishing

F-Secure to acquire MWR InfoSecurity

The acquisition is a significant milestone in the execution of F-Secure’s growth strategy, and makes it the largest European single source of cyber security services and detection and response solutions.

AMP appoints data scientist to cyber team to meet ‘audacious’ target

Last year, AMP’s cyber team took a “fairly audacious target” to the board: bring down the number of cyber security vulnerabilities across the company by ten to 15 per cent every month.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

Partner Content
Malware in attachment? Stop them before they hit your organization's security

Malware authors are continuously experimenting and employing new tactics to disguise their malware into email attachment. The key objective is to make the email look “normal” and “non-suspicious”, which will prompt the recipient to open the attachment without any suspicion.

ESDS launches MTvScan 2.0 with HSMC as India’s exclusive partner

The new version is equipped with deep-scanning technology that is designed to prevent smartphone-based phishing scams.

Users attacked with malicious Office documents grew fourfold: Kaspersky

Attacks based on exploits are considered to be very powerful, as they do not require any additional interactions with the user and can deliver their dangerous code discreetly.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Negligent Employee: A dangerous internal cyber threat

As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face.