When it comes to expectations around the necessity for securing and protecting customer data, the EU General Data Protection Regulation…
Browsing: Malware and Vulnerabilities
The distributed approach to cybercrime has forever changed the threat landscape. It was erected around a business model of maximising…
Multi-stage malware sneaks into Google Play Another set of malicious apps has made it into the official Android app store.…
News broke overnight of a new banking trojan, discovered by security experts and christened IcedID. The trojan appears to still be…
Microsoft has just released their patches for the month of November and Greg Wiseman, Rapid7’s Senior Security Researcher has provided his…
New human-centric security features bring together cloud access, data protection and network security capabilities to identify, adapt and respond to…
Security researchers have discovered an exploit within an Antivirus software that takes advantage of the “restore from quarantine” function and allows a…
Private Browsing (referred to as InPrivate in Internet Explorer, Private Browsing in Mozilla Firefox, and Incognito mode in Google Chrome)…
It’s being reported today that Fancy Bears hacking group have changed the tactics of a phishing campaign which uses a Microsoft exploit to install…
TrendMicro’s latest research suggested that unsecured and dated Windows operating systems are the weak link when it comes to cyber attacks on…