Fax Capable Printers an Attack Prospect for Malware Payload

Fax Capable-Printers, an Attack Prospect for Malware Payload

The fax machine in the eyes of the millennial generation is what is the Walkman, cd player and cassette tapes are today, a relic of the forgettable past. However, some…

Read More
The Story of Security in the History of Computing

The Story of Security in the History of Computing

During the decades gone by, a company that used a computer system for some sort only had two variables to cover when it comes to computer security: External floppy disk…

Read More
Open EDR
145 Windows malware loaded Play Store Apps deleted by Google

145 Windows-malware loaded Play Store Apps, deleted by Google

Google, upon the advice of Palo Alto Networks from last week, has deleted 145 apps in its Google Play Store which were proven harboring malicious Windows-based malware. The apps were…

Read More
BitPaymer Malware renders Mat Su Alaska Government to Reuse Typewriters

BitPaymer Malware made Mat-Su Alaska Gov’t to Reuse Typewriters

Electromagnetic pulse (EMP) attacks can render our advanced technology to recede as back to pre-industrial revolution stage. In other words, we in the corporate world will be forced back to…

Read More
Understanding Business Intelligence and Data Security

Customized Phishing Campaign that target High-Profile Business

A modern phishing campaign focusing on the industrial sector appears once again and demonstrated how attackers are continually enhancing at attracting high profile-clients into executing malware on their systems. Kaspersky…

Read More
Exploit Kit Delivering Bootkit and Cryptocurrency Mining Malware Discovered

This New “Underminer” Exploit Kit Is Delivering Up Malware To Asia

Malware researchers at Trend Micro just discovered a new exploit package they have dubbed “Underminer,” which delivers an infectious bootkit to a system’s boot sectors. They have also uncovered a…

Read More
PowerGhost the PowerShell Cryptomining Malware

Here’s Why Kaspersky Says PowerGhost Is The Malware Of The Future

PowerShell is Microsoft’s new method for enabling system and network administrators to work with command lines, providing them with a more advanced scripting system where they can automate routine tasks….

Read More
Major Cyber Espionage vs Supply Chains Apps imminent US Intelligence Service

The Major Cyber Espionage vs Supply Chains Apps is Coming

The United States, through its intelligence agencies, has uncovered a major cyber espionage vulnerability against software-based supply chain software. A supply chain attack refers to a cyber attack of unauthorized…

Read More
google next san francisco 2018 feat img 860w 325h 845x321

Google’s Next 18 Conference Slated To Spotlight Security

Google’s Cloud Next 2018 conference being held in San Francisco on July 24-26 plans to highlight its best cloud defenses and how to neutralize hacker-initiated malware. The two-factor authentication widget…

Read More
What Will Be The Next Big Disruption To The World Of Firewall Security

What Will Be The Next Big Disruption To The World Of Firewall Security?

When it comes to protecting networks and infrastructure, a traditional firewall is still considered to be the best cybersecurity shield for organizations. Over the past 30 years, firewalls have developed stateful…

Read More

Page 14 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register