DDoS attacks are commonly utilised as a distraction for a much larger and more damaging attempt at data exfiltration or breach.
Browsing: Malware and Vulnerabilities
ESET Ireland researchers have compiled a summary of the most important cybercrime trends we can expect in 2015.
Ponemon’s latest research quantifies a point that we’ve all come to understand: the cost of data breaches is increasing for organizations of all sizes.
The Internet Systems Consortium, better known as ISC, thinks it might have had a malware infection.
Carmine Clementelli, Security Expert and Manager at PFU, a Fujitsu Company, investigates the Sony hack and wonders if it was an inside job.
The PCI Security Council has announced new guidance addressing compliance practices they call “Business As Usual (BAU).”
As we approach the new year, here are eight areas of IT security for you to consider to avoid becoming the next data breach news story.
Pierluigi Stella, Chief Technology Officer at Network Box USA, provides his security predictions for 2015.
Following a range of cyber security scares during 2014, users are being advised to start the New Year afresh by updating their security to stay cyber safe.
If you think that high profile companies like Home Depot and Sony don’t have sophisticated cyber security measures, you haven’t been paying attention.