Security News

What Is a Rootkit Detection and Prevention

What Is a Rootkit? Detection and Prevention

Rootkits are secret computer programs that allow continuous and privileged access to a computer and actively hide its existence. The term rootkit is the combination of the two words “root”…

Read More
Spear Phishing How to Protect Yourself From an Attack

Spear-Phishing: How to Protect Yourself From an Attack

Spear-Phishing Even with the number of messaging apps available now, companies still use email. On average, a person receives over a hundred emails a day from bosses and companies. Because…

Read More
Open EDR
Digital Transformation and Implementation of Information Security

Digital Transformation and Implementation of Information Security

Security has been a major concern for everyone recently, especially for companies that use technology as the main component of their service offering. The increasing pressure of consumer expectations is…

Read More
Understanding the Difference of Multi tenant SaaS

Understanding the Difference of Multi-tenant SaaS

Why would you consider using a multi-tenant SaaS? What are its advantages? In the earlier days of the cloud, companies were hesitant in using this new technology. There were a…

Read More
What is Data Exfiltration and How to Prevent

What is Data Exfiltration and How to Prevent

Defining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of data occurs from one device to another. This can be done…

Read More
How SOCaaS Evolves Corporate Security Infrastructure

How SOCaaS Evolves Corporate Security Infrastructure?

Last month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…

Read More
Overview Of Vulnerability Management

Overview Of Vulnerability Management

As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…

Read More
Email Remains The Biggest Vulnerability

Email Remains The Biggest Vulnerability, According To A Survey

Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a…

Read More
Japans 7 Eleven Store Customers lose ¥55 million

Japan’s 7-Eleven Store Customers lose ¥55 million

The operator of Seven-Eleven store operators in Japan said Thursday that some 900 customers using their mobile payment services could lose 55 million yen (the US $ 510,000) due to…

Read More
D Link agrees to Security Assessment to Settle FTC lawsuit

D-Link agrees to Security Assessment to Settle FTC lawsuit

D-Link has agreed to make some security enhancements that have reorganized the company’s security platform to resolve disputes from the Federal Trade Commission (FTC) because it has misinterpreted the security…

Read More

Page 16 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register