With over 90 percent Indian businesses revealing that they are at risk of being breached, how should enterprises look at security this year?
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
A recent finding revealed that Indian healthcare companies are spending less than 6 percent of the total IT budget on cybersecurity. Given the spate of recent cybersecurity attacks bringing the industry to its knees, is the healthcare sector a sitting duck for cyber thugs?
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.
Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.
Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.
Learn how effective machine learning can help prevent malware and protect your endpoints.
A WannaCry cryptor sample from February 2017 looked like a very early variant. More research is required into older versions of Wannacry.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
Ransomware vісtіm will not be able to access his іnfоrmаtіоn.Rаnѕоmwаrе operations succeed bесаuѕе thеу capitalize оn fear, whісh ultіmаtеlу fоrсеѕ vісtіmѕ to dо something іrrаtіоnаl ѕuсh аѕ paying суbеrсrіmіnаlѕ.
Cyber-criminals are finding better approaches to adventure shortcomings and attempting to grow perpetually complex techniques for assault–or discovering innovative rehashes of old traps.
As the world continued to tackle the ransomware “Wannacry,” an Indian tech-food company, Zomato was breached. Tune into this week's CSO Alert to know more about these breaches and other stories.
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
While the online medium is effective, it is also vulnerable to data theft and online attacks. Hence the necessity for SSL certificate for e-Commerce portal, to protect customer data and win their trust.
How search for cheap SSL Certificate on Google mislead and cheat customers.
3-year SSL Certificates lifetime to be reduced to prevent the inherent security and logistics issues.