Malware

What Will Be The Next Big Disruption To The World Of Firewall Security

What Will Be The Next Big Disruption To The World Of Firewall Security?

When it comes to protecting networks and infrastructure, a traditional firewall is still considered to be the best cybersecurity shield for organizations. Over the past 30 years, firewalls have developed stateful…

Read More
Malware

These 5 Easy Malware Policies Can Improve School Security

Despite the importance of school security, computers on educational campuses are considered to have the weakest level of overall cybersecurity. In the case of public schools, corporations, social do-gooders, and…

Read More
Open EDR
Malware Volume Records Big Surge in the First Half of 2018 Report

Why Experts Now Say 2018 Is Drowning In Malware

According to a recent report, malware attacks have continued to accelerate in the first half of 2018, accompanied by dangerous ransomware which is back in full force. The 2018 SonicWall…

Read More
Things to Consider When Defending Against Malware

Things to Consider When Defending Against Malware

“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…

Read More
Hacking Campaign that Uses Stolen DLink Certificates to Spread Backdoor Malware

Stolen D-Link Certificates Spreads Backdoor Malware

A new hacking campaign discovered recently makes use of stolen D-Link certificates to spread backdoor malware. Cybersecurity researchers at ESET have spotted the new malware campaign when their systems started…

Read More
Emotet Malware Delivered Via Microsoft Office Documents 1

Emotet Malware Delivered Via Microsoft Office Documents

A new malware campaign has been detected in which Emotet malware is being delivered using Microsoft Office documents attachments and the documents being named as “Greeting Card”. The hackers who…

Read More
Macro Based Malware That Replaces Desktop Shortcuts to Install Backdoor

The Sneaky Way Macro-Based Malware Installs Backdoors

Cybersecurity researchers have detected an unusual breed of malware that modifies shortcut files on desktops to secretly download backdoor programs. I a recent blog past, Loseway Lu, a researcher at Trend…

Read More
Fundamentals of Computing Security in the World of Modern Malware and Threats

Fundamentals Of Computing Security

Because the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…

Read More
Trojans on Unauthorized Financial Apps

How to Identify and Combat Trojans on Unauthorized Financial Apps

Trojans, as we know, are malicious computers programs that infect devices/systems by mimicking genuine software and then going on to extract data from the system/device. Trojans that mimic banking applications…

Read More
Cryptomining malware The New Cash Cow of Virus Authors

Why Cryptomining Malware Is The New Cash Cow of Virus Authors

As electricity rates go up, and ASIC machines are increasing in price, people of questionable character that place bets in mining have only one solution left. This is to enable…

Read More

Page 11 of 21

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register