Cybersecurity has become a major topic of discussion for businesses and organizations of all sizes, as the number of security incidents has spiked, capturing headlines worldwide.
All about Virtualization and Cloud Security | Recent Articles:
C-level managers and directors, increasingly concerned about the legal and financial implications of security breaches, have started to set up regular meetings and to participate in the overall security strategy.
As security companies and law enforcement take enhanced security measures to disrupt botnet activity, cybercrime organizations continue to improve command & control techniques to increase the ROI of their sophisticated botnets.
Enterprises today are engaged in a never ending arms race with malicious and criminal attackers who craft malware designed to infect systems and networks – and remain unnoticed the entire time they’re doing it. The attack codes they use today are largely more clandestine versions of what security professionals have been battling for some time: application and operating system exploit code, traffic sniffers, bots, Trojans – whatever works to achieve the designed goal whether that be to exfiltrate information, disrupt system access, conduct medical identity theft, or steal financial account info and intellectual property.
It’s been 38 years since the invention of email and today, it is still the number one communication tool in and out of enterprises. While technology, hardware, infrastructure and the internet itself evolved tremendously in the past almost 4 decades, email is the spoiled child of the family that declines to grow up.
Online extortion is on the rise.
Not only have recent months seen an increase in distributed denial-of-service attacks with demands that companies pay up to have their website returned to normal working order, and even the theft of confidential data with threats that it will be released to the public if financial demands are not met, but there has been a noticeable increase in ransomware attacks too.
The fear of not having enough privacy has been on many people’s mind for the past couple of years, as internet service providers have started collecting user data to either better their marketing campaigns or provide new services that fit customers’ needs.
With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what 2016 may bring for the security industry, the online criminal underworld, and corporate and private consumers.
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about the safety of the internet. More than 97 percent of web servers run some Linux OS distribution, and the new threat of Linux ransomware brings with it a whole new element to the danger.
Revelations by security researchers this week are showing just how prevalent malicious advertising, better known as malvertising, has grown on the biggest publishing sites on the web. According to reports out from Black Hat, this year has seen nearly a three-fold
While rare, every now and then, major cloud providers such as Amazon must ponder interrupting service to reboot parts of their environments. It is a curious thing, and leads to asking, “Why?”