E-commerce revenue is constantly increasing, but the number of fraud cases, as well as the percentage of fraud in online…
Browsing: Malware and Vulnerabilities
According to an article in the New York Times, the FBI asked a judge to help break encryption software all the way…
In the world of computers, viruses are not an uncommon thing to hear. Viruses are to computers what infections are…
Badlock was discovered by the Open Source Samba community and apparently underpins both Samba and Windows Server Message Block (SMB). The…
ESET researchers analysed a scam campaign on Facebook that spreads a malicious browser plugin via social engineering techniques. The attack…
What could be better than sitting in your favorite café, sipping latte and browsing whatever the drama of the day…
Carbon Black®, a leader in Next-Generation Endpoint Security (NGES), today announced the results from its first Unified Threat Research report,…
New dynamic classification ensures organizations worldwide are quickly protected from socially-engineered impostor emails, also known as business email compromise (BEC)…
Business and government leaders grapple daily with innovation’s double-edged sword: as new technologies introduce unprecedented levels of efficiency, speed, and…
Following the news that an SQL injection has been discovered on one of the corporate systems of the Panamanian lawyers…