Malware

These 5 Easy Malware Policies Can Improve School Security

Despite the importance of school security, computers on educational campuses are considered to have the weakest level of overall cybersecurity. In the case of public schools, corporations, social do-gooders, and…

Read More
Hackers use Fake bills to dupe users to download malware

Why “Special Ear” Is The New Fiend On The Internet

Security researchers have recently discovered a cybergroup in China who are working on a new type of hacking campaign using the shipping and transport industry. The campaign is called “Special…

Read More
Open EDR
Malware Volume Records Big Surge in the First Half of 2018 Report

Why Experts Now Say 2018 Is Drowning In Malware

According to a recent report, malware attacks have continued to accelerate in the first half of 2018, accompanied by dangerous ransomware which is back in full force. The 2018 SonicWall…

Read More
Things to Consider When Defending Against Malware

Things to Consider When Defending Against Malware

“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…

Read More
Password Stealing Malware Sneaks into Google Play Store Via Bogus Apps

A Malware That Might Look Like A Google Play Application

Security researchers recently discovered a group of cybercriminals successfully spreading Trojan banking malware through the use of bogus Google Play applications. First detected in June by professionals at IBM X-Force, the…

Read More
Threat Protection AI Powers Sophos Email

Can Artificial Intelligence Boost Future Email Security?

Not everyone is aware that email is one of the oldest technologies we still use today as one of the several services provided by the internet. The very first email…

Read More
Macro Based Malware That Replaces Desktop Shortcuts to Install Backdoor

The Sneaky Way Macro-Based Malware Installs Backdoors

Cybersecurity researchers have detected an unusual breed of malware that modifies shortcut files on desktops to secretly download backdoor programs. I a recent blog past, Loseway Lu, a researcher at Trend…

Read More
Fundamentals of Computing Security in the World of Modern Malware and Threats

Fundamentals Of Computing Security

Because the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…

Read More
Password Stealing Malware the latest tool for Cybercriminals

Password Stealing Malware the latest tool for Cybercriminals

Remember last year, Verizon released data breach investigation report that showed 80 percent of the hacking was related to stolen password. The cybercriminals used the victim’s password to gain access to their…

Read More
Trojans on Unauthorized Financial Apps

How to Identify and Combat Trojans on Unauthorized Financial Apps

Trojans, as we know, are malicious computers programs that infect devices/systems by mimicking genuine software and then going on to extract data from the system/device. Trojans that mimic banking applications…

Read More

Page 15 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register