4 Ways to Recover from a Cyberattack

More companies are falling victim to cyberattacks, as a wide range of harmful software and social engineering schemes threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the rise every year, it’s important for businesses of all sizes to have a recovery plan in place to mitigate any […]

Mobile security: The reality of malware … augmented

Read Denise Giusto Bilić’s article about the reality of mobile security and how malware affects cyber security on We Live Security : Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolved beyond this point, […]

You’ve Got Ransomware, Now What?

Read Dave Packer explain what companies can do once they are infected with a ransomware on SC Magazine : So, the unthinkable has happened: your corporate server (or maybe just a few employees) has been infected with ransomware. At least you’re not alone. A recent survey found that 47 percent of companies in the United […]

Top 10 most malware-infected US cities

Webroot revealed the top 10 most malware-infected US cities. According to Webroot’s data, Houston is the most infected US city with 60,801 infected devices. Read about the new report by Webroot which reveals the 10 most malware infected cities in the United States on Helpnet Security.

Google accounts hit with malware — a million and growing

More than a million Google accounts have been hit by malicious software, a security firm said on Wednesday. Check Point said in a blog post that the attack campaign, known as Gooligan, is expanding to an additional 13,000 devices a day. Read how the Gooligan malware has infected more than 1 million Android smartphones around the […]

How to Protect Against Mobile Malware

Read Dave Whitelegg explain how to protect against mobile malware on IT Security Expert : IBM Security recently released a white paper on the mobile malware threat, which included general guidance on managing the mobile threat and an overview of IBM’s MaaS360 Mobile Threat Management tool, I thought it was good advice and well worth […]

Protecting against the threat of PoS malware

The recent resurgence in point-of-sale (PoS) malware attacks has, once again, demonstrated the vulnerability of these systems. Over the course of just a few weeks, breaches were reported at Oracle’s MICROS point-of-sale division and the HEI Hotels and Resorts group. Read about how to protect your business against PoS malware on Information Age.

Enterprise cloud apps carry 26 malware, on average

On average, enterprises have 26 piece of malware in their cloud apps, according to a new report. Cloud access security broker Netskope just released its Cloud Report – Autumn Edition, showing an overview of cloud app usage and trends in the EMEA (Europe, Middle East, Africa) region. Read more about the new Cloud Report by […]

The Malware Battle Is Mostly Silent

Read Ionut Arghire’s article on security researcher’s silent war with malware developers on Security Week : Malware’s success relies on the ability to remain stealthy, and the authors of malicious programs go to great lengths to make that happen, while also ensuring that their identity remains hidden. As a general rule, malware developers tend to […]

Rising Use of Encryption Gives Malware a Perfect Place to Hide

Read why Tara Seals says that rising use of encryption gives malware a perfect place to hide on Infosec Magazine : Nearly half of cyber-attacks this year have used malware hidden in encrypted traffic to evade detection. In an ironic twist, A10 Networks has announced the results of an international study with the Ponemon Institute, revealing […]