A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.
Hidden motivations in separate but similar destructive events
Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR.
How to gain visibility and control of data in cloud apps.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The golden age of Trojans and viruses has long gone.
While the (cyber-)world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.
F-Secure blocks the new ransomware that spreads like May’s historic outbreak. However, this time the criminals appear to be pros.
Digital transformation has left a whole host of vulnerabilities attacking the workplace from all quarters. Leo Joseph, Senior Director of Enterprise Sales and Solutions, at HP India, gives us a glimpse at what’s at stake.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
Charru Malhotra, Associate Professor of e-Governance and ICT at the Indian Institute of Public Administration, discusses the importance of bolstering security for the smart and digitally inclusive nation.
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
A recent finding revealed that Indian healthcare companies are spending less than 6 percent of the total IT budget on cybersecurity. Given the spate of recent cybersecurity attacks bringing the industry to its knees, is the healthcare sector a sitting duck for cyber thugs?
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
Security experts say WannaCry demonstrates need for renewed focus on network security and computer configuration management.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.