Software Asset Management Critical to Cybersecurity Initiatives and Automation to Managing Agile Development Cycles in 2016 Vincent Smyth, General Manager…
Browsing: Malware and Vulnerabilities
ESET took part in a global operation to uncover malware affecting more than a million computers. The operation by law…
In response to a new piece of research from ESET which revealed that 138,000 mobile phones and laptops are left in…
More than 80 percent of mobile devices have encryption flaws, while an application written in any of a trio of…
You may have seen news that security researchers say they have uncovered further vulnerabilities on TalkTalk’s website and email services…
According to SC Magazine, The Node.js Foundation has revealed a couple of bugs within its JavaScript software that could lead…
The Register has reported that “one of the most prolific and capable Russian malware groups is using a rare module…
This season cybercriminals take advantage of online shoppers. Below are four tips from Proofpoint cybersecurity experts on how to stay…
A rise in stolen DNA and fingerprints to commit fraud and identity theft If 2015 is to be considered “the…
Cyber attackers are repurposing penetration testing tools to break into the networks of small and medium-size businesses worldwide with the…