There are a lot of security myths about cloud security needed to be clarified. One is that a lot of…
Browsing: Malware and Vulnerabilities
When most people are asked to think of a wall of fire, they might think of the pyrotechnic scene on…
Cloud fan-out effect shows attackers use sync and share to propagate threats Netskope, the leading cloud access security broker, today…
Kaspersky Lab experts have detected Triada, a new Trojan targeting Android devices that can be compared to Window-based malware in…
In a study that looked at the password strength required to access website account for Wells Fargo, Capital One and…
Monzy Merza, chief security evangelist and director of cyber research at Splunk on the Hack the Pentagon project, which invites experts…
Proofpoint discuss their recent discovery of a new Advanced Persistent Threat (APT) which is targeting Indian diplomatic and military resources.…
Nokia has released a report which shows that smartphones now account for 60% of infections in the mobile network with…
It was way back in 2011 when I spoke of the key security challenges on the CISO’s radar in the…
There is no such thing as static security – all security products become vulnerable over time as the threat landscape…