The information created and processed by a business, whether about products, operations, customers or financial performance, can play a vital…
Browsing: Malware and Vulnerabilities
Following the news of the Twitter cyber attacks, please find below advisory comment from David Emm, principal security researcher at…
Leader in social media security provides automatic Instagram protection against image and text-based threats, compliance violations and inappropriate content Proofpoint,…
Companies Will Have the Power to Prevent Most Hacks Before They Happen – If They Act! While the volume of…
WinMagic to protect NCR cash machines globally with full disk encryption technology WinMagic Inc., the leading provider of encryption and…
The cyber-acts that will define 2016 could see an increase in vulnerabilities from the aging Internet, U.S. presidential election cyber-antics,…
For many Black Friday heralds the official start of Christmas shopping season. And if past years are anything to go…
Ransomware’s Early Days The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS…
Recent data breaches such as the Ashley Madison1 and TalkTalk2 sagas have painted a very grim portrait of the state…
Predictions for the coming new year always abound. While no one has a crystal ball, I have the benefit of…