In what appears to be a bold attack on net freedom, the government of Kazakhstan will reportedly attempt to spy…
Browsing: Data Privacy
A number of Touchdown Clients have Predictions for 2016 Adapt – Kevin Linsell, Director of Strategy and Architecture Tighter security…
F-Secure researcher authors new report exploring how hackers are using third party services to spread malware and extract stolen data…
“Once again, Mattel’s ‘Hello Barbie’ doll is in the news”. David Emm, Principal Security Researcher at Kaspersky Lab said :…
Cybercriminals to Target New Payment Technologies, Generic Top Level Domains and the US Elections in 2016 The year 2015 has…
The information created and processed by a business, whether about products, operations, customers or financial performance, can play a vital…
Following the news of the Twitter cyber attacks, please find below advisory comment from David Emm, principal security researcher at…
Leader in social media security provides automatic Instagram protection against image and text-based threats, compliance violations and inappropriate content Proofpoint,…
WinMagic to protect NCR cash machines globally with full disk encryption technology WinMagic Inc., the leading provider of encryption and…
Ransomware’s Early Days The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS…