More companies are falling victim to cyberattacks, as a wide range of harmful software and social engineering schemes threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the rise every year, it’s important for businesses of all sizes to have a recovery plan in place to mitigate any […]
Read Denise Giusto Bilić’s article about the reality of mobile security and how malware affects cyber security on We Live Security : Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolved beyond this point, […]
Read Dave Packer explain what companies can do once they are infected with a ransomware on SC Magazine : So, the unthinkable has happened: your corporate server (or maybe just a few employees) has been infected with ransomware. At least you’re not alone. A recent survey found that 47 percent of companies in the United […]
Webroot revealed the top 10 most malware-infected US cities. According to Webroot’s data, Houston is the most infected US city with 60,801 infected devices. Read about the new report by Webroot which reveals the 10 most malware infected cities in the United States on Helpnet Security.
More than a million Google accounts have been hit by malicious software, a security firm said on Wednesday. Check Point said in a blog post that the attack campaign, known as Gooligan, is expanding to an additional 13,000 devices a day. Read how the Gooligan malware has infected more than 1 million Android smartphones around the […]
Read Dave Whitelegg explain how to protect against mobile malware on IT Security Expert : IBM Security recently released a white paper on the mobile malware threat, which included general guidance on managing the mobile threat and an overview of IBM’s MaaS360 Mobile Threat Management tool, I thought it was good advice and well worth […]
The recent resurgence in point-of-sale (PoS) malware attacks has, once again, demonstrated the vulnerability of these systems. Over the course of just a few weeks, breaches were reported at Oracle’s MICROS point-of-sale division and the HEI Hotels and Resorts group. Read about how to protect your business against PoS malware on Information Age.
On average, enterprises have 26 piece of malware in their cloud apps, according to a new report. Cloud access security broker Netskope just released its Cloud Report – Autumn Edition, showing an overview of cloud app usage and trends in the EMEA (Europe, Middle East, Africa) region. Read more about the new Cloud Report by […]
Read Ionut Arghire’s article on security researcher’s silent war with malware developers on Security Week : Malware’s success relies on the ability to remain stealthy, and the authors of malicious programs go to great lengths to make that happen, while also ensuring that their identity remains hidden. As a general rule, malware developers tend to […]
Read why Tara Seals says that rising use of encryption gives malware a perfect place to hide on Infosec Magazine : Nearly half of cyber-attacks this year have used malware hidden in encrypted traffic to evade detection. In an ironic twist, A10 Networks has announced the results of an international study with the Ponemon Institute, revealing […]