Unlike the traditional ‘stop-start’ approach to vulnerability management driven by snapshot scans, continuous detection and mitigation of vulnerabilities
Browsing: Malware and Vulnerabilities
The fact that this vulnerable version of OpenSSL has been around for more than 2 years, many services and their related data have been vulnerable.
By now, you are probably aware of the Heartbleed Bug. There are many people who have heard about it, but don’t understand what it is.
We all use signatures. Signatures here, signatures there. They grant authenticity and trust, among other things, or at least they’re supposed to.
CipherCloud, the leader in cloud information protection, expands its Discover, Protect, Monitor platform with CipherCloud for Cloud Discovery.
Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites
Our estimate suggests that criminals could penetrate three quarters of the U.S. corporate world using unpatched Windows XP vulnerabilities.
Websense, Inc. is a global leader in protecting organisations from the latest cyber attacks and data theft.
Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash software.
Hardware and software are like love and marriage and, to reference the old Sinatra classic, you can’t have one without the other.