Ransomware

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?

McAfee Labs says fileless cyberattacks are on the rise in 2018

McAfee Labs has released new research that reveals a shift in cybercriminals tactics away from external malware threats, towards ‘fileless’ attacks that leverage trusted Windows executables to invade systems and breach corporate networks.

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

8 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

Seqrite detects high-risk Trojan that targets businesses

The multipurpose ransom-miner was detected by Seqrite experts when they observed a series of evolved malware blocked by the brand’s state-of-the-art security solutions at the customers’ end.

Data security in financial services: Meeting the challenges head on

Recent research suggests that Financial Services firms have experienced a threefold increase in the rate of breaches, over the past five years. Financial Services companies face almost three times more cyber attacks than any other industry.

Symantec introduces new Email Threat Isolation solution

Email Threat Isolation takes prevention to the next level by ensuring suspicious links to risky web pages are isolated, allowing safe access.

Security alert: Hackers shift focus from ransomware to cryptojacking

Hackers have been increasingly moving towards cryptojacking attackshijacking computing resources and using that to mine cryptocurrency.

Bitdefender unveils new 2019 product line

Bitdefender launches its 2019 consumer security product line, which aims to stop criminals before they attack.

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

How to tell if your computer has been hacked

Although most of us have some form of anti-malware software installed, this cannot always offer peace of mind in regards to attacks on our networks, given that cyber attacks are constantly evolving.

Partner Content
Is Your Data Hackproof?

Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers.