If your files could talk, I guarantee that they would have a lot to say. With larger quantities of data…
Browsing: Malware and Vulnerabilities
Veracode’s Supplement to the 2015 State of Software Security: Focus on Application Development report benchmarks application risk profiles by type…
F-Secure researcher authors new report exploring how hackers are using third party services to spread malware and extract stolen data…
Employee behaviour is one of the biggest risks facing IT security in organisations today. The enormous uptake of the Internet…
The benefits of hospital device connectivity According to the Royal College of Nursing, nurses in the UK spend an estimated…
Would you pay 800€ to have your encrypted computer files unlocked? That’s the going rate of cybercriminals’ ransomware these days.…
Last July, Damballa’s Threat Discovery Center discussed the infamous web forum, Darkode, that was supposed to be resuscitated by sp3cial1st.…
“Once again, Mattel’s ‘Hello Barbie’ doll is in the news”. David Emm, Principal Security Researcher at Kaspersky Lab said :…
Cybercriminals to Target New Payment Technologies, Generic Top Level Domains and the US Elections in 2016 The year 2015 has…
A recurring claim at security conferences is that “security is a big data / machine learning (ML) / artificial intelligence…