Author Details

Adwind Spyware-as - a-Service Utility Grid Operators Attacks

A phishing campaign for grid operators uses a PDF attachment to offer spyware. A campaign aimed at a domestic...

Read More
Difference Between Data at Rest and Data in Transit

When data is actively moving from one location to another either via the internet or a private network, this...

Read More
Polymorphic Refers to a Malware’s Ability to Change

When it comes to malicious programs, polymorphic refers to a malware’s ability to change itself and its identifiable features...

Read More
Why Companies Need Endpoint Protection

Endpoint protection, also known as endpoint security, is a security solution that addresses malicious cyber-attacks from endpoint devices, such...

Read More
Understanding What Is Malware Analysis

What is malware analysis? This is the process involved in studying and learning how a particular malware works and...

Read More
Zero-Day Security Flaw Since Windows 98, Exposed By Google

A two-decades old security flaw in Windows and Office involving the Text Services Framework module named MSCTF has been...

Read More
Canon DSLR Camera, The “Unlikely Likely” Candidate For Ransomware Infection

We are covering ransomware and the latest “innovations” to improve it at the expense of the poor victims since...

Read More
API Security, Developers And Users Responsibility

The world of software development today is flooded by APIs (Application Programming Interface). We can think of whatever web...

Read More
Data Loss Prevention How to Prevent Your Data From Disappearing

Data loss is one of the biggest security concerns of companies, especially those that handle sensitive data like bank...

Read More
IoT-capable Printers Becoming Unofficial Gateways For Cyber Attacks

The printer started as a simple device for printing on paper, providing users with a physical copy of their...

Read More

Page 2 of 96


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password