ESET has analysed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014.
Browsing: Malware and Vulnerabilities
Michael Aminzade of Trustwave reflects on what organisations can do to help protect themselves from falling victim to a breach.
Sloan McKinney discusses how both the UK Government and private businesses are starting to take cyber security seriously.
Proofpoint, Inc. has released the first social media security study that exposes the security threats plaguing Fortune 100 social media accounts.
Carmine Clementelli, a security expert and manager with PFU, a Fujitsu Company, discusses what we know about the Guardians of Peace and the Sony hack.
PhishMe senior researchers Ronnie Tokazowski and Shyaam Sundhar announce the top three phishing scams of 2014.
Stephen Morrow, Head of Security Services at SQS, reminds us of how and why security is a crucial factor when developing software.
Acumin explains the various ways viruses can be delivered to and attack smartphones and other mobile devices.
Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014, among which targeted attacks stand out.
Information security journalist Thu Pham reveals how banks and retail organizations aren’t the only targets when it comes to stolen financial data.