Ransom32 has been discovered which seems to be the first cross-OS ransomware that uses JavaSript to infect users and is…
Browsing: Malware and Vulnerabilities
Cyberattacks against energy companies in Ukraine in December 2015 are connected to attacks on media and targeted cyber espionage against…
If there is one concern that all ecommerce site owners share, it’s security. A major security breach could prove fatal…
Microsoft’s storage of Windows encryption keys could expose users to hackers or government surveillance. Disk encryption is a built-in feature…
Researchers from ESET have just discovered that the BlackEnergy trojan was recently used as a backdoor to deliver a destructive…
With CES this week, the connected home and future of what our homes will look like will take centre stage.…
Major data breaches make headlines too frequently, reinforcing the fact that even if organizations deploy top of the line security…
One of the best ways to improve is to learn from others’ mistakes. The good news is, with cyber security,…
If your company shuts its data storage systems down during the holidays, be careful that it’s not the last shutdown…
What does 2016 have in store for businesses and consumers with regards to cyber security threats? A specialist in malware detection,…