In February 2016, following an alert from a partner, Kaspersky Lab’s Global Research and Analysis Team began an investigation. It…
Browsing: Malware and Vulnerabilities
With a sports packed summer upon us, including WImbledon, Euro’s and the Olympics, 2016 really is a year of sport.…
It has been discovered that ISPs around the world are receiving fake copyright infringement notices and settlement demands in hopes…
Internet service providers are reportedly being targeted by a new phishing scam related to Game of Thrones pirates that is…
A group of Cisco researchers have managed to spot malicious traffic in encrypted traffic without any need to decrypt data.…
Following the news about Wendy’s breach 3x scope previously reported, Brad Bussie, Director of Product Management, STEALTHbits commented below. Brad…
Cyberterrorism: just how real is the threat? When confronted with the idea of cyberterrorism, much of the population would shrug.…
When we manage/administrate a Wordpress (WP) website publicly accessible to the Internet, two things are important to considerate/thinking about in…
Jeff Harris, VP, Solutions Marketing at Ixia looks at the growing armies of botnets, and how their tactics can be…
With the news from the National Crime Agency (NCA) that UK law enforcement and businesses are losing the “cyber arms…