In recent years, the mobile workforce has grown rapidly. Many forward-thinking companies have recognized the benefits of remote work and…
Browsing: Endpoint Security
We live in a world where connectivity is key. It’s brought conveniences to our personal lives, and organizations are adopting…
Check Point Announces Infinity Total Protection, a Unique New Security Model to Prevent ‘Gen V’ Threats and Attacks Game-changing new…
Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an…
Mobile app flaws could compromise industrial network infrastructure Seattle, Wash. -IOActive, Inc., the worldwide leader in research-driven security services, and Embedi, a cybersecurity…
Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more…
Santa Clara, Calif. – McAfee today announced further collaboration with Samsung to support the back-end for Samsung’s newly pre-installed Wi-Fi protection, Secure Wi-Fi…
Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play…
Nearly every year the big brands will bring out a new smartphone, full of fresh and exciting technology, but these…
News broke this morning that ransom attacks on MongoDB databases revamped over the weekend after an apparent pause. According to the security researchers Dylan Katz and Victor…