Many of the modern gifts are digital products like notebooks, ultrabooks, tablets, smartphones. How do we protect our children when…
Browsing: Ransomware
NNT review and discuss the range of Cyber Security Threats predicted by analysts and vendors and present a Top Ten…
The first ransomware of Apple Mac computers has targeted users this weekend. An Apple representative said the company had taken…
There are a lot of security myths about cloud security needed to be clarified. One is that a lot of…
When most people are asked to think of a wall of fire, they might think of the pyrotechnic scene on…
It was way back in 2011 when I spoke of the key security challenges on the CISO’s radar in the…
Two German hospitals are being extorted by cyber criminals through ransomware. This follows the payment of the $17,000 ransom by…
Researchers at Forcepoint Security Labs are helping businesses fight back against malware authors by reverse engineering the algorithms used by…
The volume of malware targeting users of mobile devices grew more than three times in 2015, compared to 2014. The…
Smart cities will provide businesses with unprecedented economic opportunities. However, cyber threat actors will be presented with an unprecedented attack…