Three Questions about Online Security

Three Questions about Online Security

When you give your personal information to a financial institution, government, or insurance company, you have a certain level of trust that they will do everything in their power to keep it safe. It’s easy to forget that at the same time you’re filling out paperwork online, in the dark world of cybercrime, hackers are […]

Still Using Weak Encryption Software

Still Using Weak Encryption Software

More than six months since The Register reported that Virgin Media had failed to move away from weak encryption software used on sensitive areas of its website – the ISP is yet to hit the upgrade button. Tim Erlin, director of security and product Management at Tripwire have the following comments on it. [su_note note_color=”#ffffcc” […]

First iOS Malware that Attacks Non-Jailbroken Devices

First iOS Malware

YISPECTER malware is the first to attack non-jailbroken Apple iOS devices by abusing private apis. So far, the malware primarily affects iOS users in mainland China and Taiwan. It spreads via unusual means, including the hijacking of traffic from nationwide ISPs, an SNS worm on Windows, and an offline app installation and community promotion. Mark […]

AdBlocking and Adblocker Blocking

AdBlocking and Adblocker Blocking

Most people are familiar with the notion of an adblocker. It’s pretty much what it says on the label: a program that blocks ads from showing. They may not, however, be entirely familiar with how adblockers work or what the best kind of adblocker for their use might be. Likewise, people are starting to become […]

Cyber Security Stress Test: Stop Stressing and Start Testing

Cyber Security Stress Test

F-Secure’s new Cyber Security Stress Test helps businesses find and learn to fill gaps in their cyber security. F-Secure has released a new tool to help businesses learn more about their security posture for European Cyber Security Month. The new Cyber Security Stress Test is a quick online questionnaire that can help companies and employees […]

Deliver End-to-End, Cross-Silo Protection of Enterprise Applications

Enterprise Applications

Crypto-Segmentation Solutions Can Protect Application Flows on Internal and External Networks, Block Top Data Breach Attack Vector Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications announced it is working with AirWatch®, the leader in enterprise mobility management (EMM), to deliver end-to-end security of enterprise applications on any device on any […]

File Data Leakage – Think Twice

Data dissemination and file collaboration are natural parts of most business and operational workflows; thus, security must be an integral part of modern corporate workflow to protect sensitive information. While structured data, information contained in databases, is well protected in the confines of secure backend systems, unstructured data is a wholly different story. Files are […]