Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.
In Q2 2017, the average share of spam in global email traffic amounted to 56.97%, which was only 1.07 p.p. more than in the previous quarter. One of the most notable events of this quarter – the WannaCry epidemic – did not go unnoticed by spammers: numerous mass mailings contained offers of assistance in combating the ransomware.
At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware.
The golden age of Trojans and viruses has long gone.
The new General Data Protection Regulation (GDPR) is the most significant change to European Union (EU) privacy law in two decades.
As the world continued to tackle the ransomware “Wannacry,” an Indian tech-food company, Zomato was breached. Tune into this week's CSO Alert to know more about these breaches and other stories.
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
How search for cheap SSL Certificate on Google mislead and cheat customers.
3-year SSL Certificates lifetime to be reduced to prevent the inherent security and logistics issues.
SSL certificate acts as a strong deterrent to phishing. But the website need to get its SSL certificate from a diligent Certificate Authority(CA)
Learn why the Necrus botnet is currently considered the world's largest spam botnet.
To mitigate threats more effectively, digital payment companies need to adopt technologies like artificial intelligence, says Fortinet's Michael Joseph.
When it comes to cyber-attacks, too often telecommunication companies and service providers are burning both ends of the candle: they’re safeguarding their most prized digital assets while trying to keep their customers secure as well.
With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems.
Protecting your network from email and web-based threats might be an overlooked responsibility in your current priority list. Here are tips for IT professionals on how to defend company networks against email threats.
The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou