A day doesn’t go by without finding out about another corporate cyber breach that has resulted in the loss of…
Browsing: Malware and Vulnerabilities
It has been two weeks since ESET found out that TeslaCrypt ransomware closed down its operations. Since then, there is…
~New Citrix research reveals one in five large companies do not have any contingency measures in place in case of…
The proliferation of cyber threats against UK enterprises has resulted in the British government demanding organisations do more to protect…
In its newest Phishing Activity Trends Report, the APWG noted a 250% increase in phishing sites between October 2015 and…
Ian Trump explores some of the IT security takeaways from the recent trial in the US of a member of…
Following the news that Mitsubishi Outlander hybrid car alarm ‘hacked’, here below the comments from two different sources. Richard Kirk, SVP…
During a regular hunt for malware, our researchers came across an interesting malicious Android app that portrayed itself as an online app…
A Brief Introduction to NetFlow NetFlow is data generated by network devices – routers, switches, firewalls, etc. – that contains…
Kaspersky Lab experts and Sberbank, one of Russia’s largest banks, worked closely with Russian Law Enforcement Agencies in an investigation…