CEO's poor password security allegedly enabled hackers to steal 1,492 in Ether coin only weeks before Enigma Catalyst’s initial coin offering.
Your weekly update of everything security!
Hidden motivations in separate but similar destructive events
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. Because the best defense is a skeptical user, here's how to be on your guard against phishing.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
In October 2016, Kaspersky Lab products detected a surge in malware infection attempts on the computers of its customers who had industrial control systems installed. This was just part of the bigger story.
In the part 2 of the GDPR article, Dan Plastina, will dive deeper into the data lifecycle and how Azure Information Protection can help you provide persistent data protection both on-premises and in the cloud.
Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
You can reduce potential damage by paying attention to when attackers are most likely to strike.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.
Learn how effective machine learning can help prevent malware and protect your endpoints.
With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.
A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.
Large Scale network promotes applications infected with the Ztorg Trojan through advertising campaigns. Infected viruses are gaining thousands of new users each day!
The damage done by Dridex banking Trojan was estimated at over $40 million. The ongoing evolution of the malware shows that cybercriminals are not about to bid farewell to this.