ESET has analysed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014.
Browsing: Identity and Access Management (IAM)
A survey conducted by BalaBit reveals that a combination of factors could create a significant security risk of a data breach occurring during the holidays.
Michael Aminzade of Trustwave reflects on what organisations can do to help protect themselves from falling victim to a breach.
Carmine Clementelli, a security expert and manager with PFU, a Fujitsu Company, discusses what we know about the Guardians of Peace and the Sony hack.
PhishMe senior researchers Ronnie Tokazowski and Shyaam Sundhar announce the top three phishing scams of 2014.
Acumin explains the various ways viruses can be delivered to and attack smartphones and other mobile devices.
Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014, among which targeted attacks stand out.
Foresight Advisory Services’ Heine van Niekerk explores some of the most notorious acts committed by the hacktivist group Anonymous over the last few years.
Intel® Security has released its McAfee Labs’ November 2014 Threats Report, including an analysis of threat activity in the third quarter of 2014.
Egress Software Technologies has designed an infographic illustrating the extensive history of encryption.