The evidence from 2015 is clear: traditional signature-based end-point protection is ineffective against the modern attack, which is persistent and…
Browsing: Endpoint Security
LockerPIN sets or changes the device’s PIN lock, unbeknownst to the user as it locks the screen and demands a…
As somebody who works closely with cryptocurrencies, it’s very common for me to receive phishing emails. Of course, we have…
Imation announces IronKey Workspace W200 PC on a Stick Imation Corp. (NYSE:IMN), a global data storage and information security company,…
Mobile apps increase enterprise attack surface and put sensitive corporate data at risk, according to analytics from Veracode’s cloud-based security…
Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from…
Mobile devices can provide corporate IT departments with a hornet’s nest of security (and support) issues – no matter whether…
The Definitive List of the World’s Hottest and Most Innovative Cybersecurity Companies Cybersecurity Ventures has announced the Q3 2015 edition…
Avast Builds Threat Detection Based on Machine Learning Avast Software, maker of the world’s most trusted PC and mobile security,…
The Cybersecurity Market Report, Q3 2015 is now available and provides comprehensive coverage on the business of cybersecurity. Inside the…