The Simple Way to Stop your Business from Being Extorted by Ransomware

Online extortion is on the rise. Not only have recent months seen an increase in distributed ...

Fearing Cloud and IoT Leads to Privacy Concerns

The fear of not having enough privacy has been on many people’s mind for the past couple of ...

Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies

With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what ...

Future Linux Ransomware Ransacking the Internet

The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...

Aug 11, 2015

The 2015 Malvertising Malaise

Revelations by security researchers this week are showing just how prevalent malicious ...

Ransomware More Dangerous than Zero-Day Exploits, Say US CIOs

APTs, Ransomware and Spear Phishing Top US CIO Concerns for 2015, Bitdefender Study Shows

Verizon Data Breach Report: Organizations Need to Do More Security Work

Organizations could be doing a lot more to prevent information security breaches. That’s one ...

Telecommunications Industry: Calling for Security Help?

Telecommunications is one of those industries that many people take for granted—until ...

Media and Entertainment Companies: Targets for High-Profile Attacks

When it comes to security vulnerabilities and threats, you might not think about the media ...

Sex, Photos, and the Shared Security Model

Recently, there has been quite a bit of media coverage about some sensitive, private ...

Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)

Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW