The Simple Way to Stop your Business from Being Extorted by Ransomware
Online extortion is on the rise. Not only have recent months seen an increase in distributed ...
Fearing Cloud and IoT Leads to Privacy Concerns
The fear of not having enough privacy has been on many people’s mind for the past couple of ...
Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies
With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what ...
Future Linux Ransomware Ransacking the Internet
The recent discovery of Linux ransomware dubbed Linux.Encoder raised serious questions about ...
The 2015 Malvertising Malaise
Revelations by security researchers this week are showing just how prevalent malicious ...
Ransomware More Dangerous than Zero-Day Exploits, Say US CIOs
APTs, Ransomware and Spear Phishing Top US CIO Concerns for 2015, Bitdefender Study Shows
Reboot the cloud? Yes, it has happened, and here’s why.
While rare, every now and then, major cloud providers such as Amazon must ponder ...
Verizon Data Breach Report: Organizations Need to Do More Security Work
Organizations could be doing a lot more to prevent information security breaches. That’s one ...
Telecommunications Industry: Calling for Security Help?
Telecommunications is one of those industries that many people take for granted—until ...
Media and Entertainment Companies: Targets for High-Profile Attacks
When it comes to security vulnerabilities and threats, you might not think about the media ...
Sex, Photos, and the Shared Security Model
Recently, there has been quite a bit of media coverage about some sensitive, private ...
Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)
Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...