AVG spoke with more than 1500 small businesses and asked them what they thought of the Internet of Things in respect of their readiness and plans to invest.
Author: ISBuzz Team
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
ESET researchers have uncovered a piece of malware that has been building a botnet in order to target Polish consulates in Belarus.
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
According to the results of a study conducted by Kaspersky Lab and B2B International, a single DDoS attack can cost a company upwards of $444,000.
Databarracks argues that our need for a culture of strong cyber security within each of our organisations supersedes that of UK-U.S. cyber war games.
Organisations that are unprepared for the new EU data protection laws could be missing out on a significant competitive advantage, says Iron Mountain.
While the media storm surrounding Sony has subsided and the whodunit game has come to a stand-still, (The FBI is still pointing the finger at North-Korea.) the main consequences regarding the cyber-attack still remain to be addressed.
An infographic from WhoIsHostingThis? provides a detailed look into VPNs and explains how to go through the relatively easy process of setting one up.