Tag Archives: security
ZIP files are being used to bypass security gateways
Security researchers at Trustwave have discovered a new phishing campaign that utilized a specially crafted ZIP file, designed to bypass secure email gateways, to distribute the NanoCore RAT. Users are targeted through a spam email pretending to be shipping information … Continue reading
These outstanding Arlo security camera deals are almost too good to be true
Buying a smart security camera is a great way to fortify your home, whether you want to ward off intruders or just keep an eye on your kids while they're playing outside – but it can be expensive. It doesn't … Continue reading
Neobanking – a security minefield?
Neobanking refers to a growing wave of 100% digital banks, which are customer-driven by nature and with a special focus on delivering frictionless money management and payment experience. Of course, internet security remains a key concern, from everything to monitoring … Continue reading
Firefox gets another major security upgrade
In a recent blog post on the Mozilla Security Blog, the Firefox-maker revealed the steps it has taken to protect users from code injection attacks by making its browser more secure. The company has hardened its browser by removing “potentially … Continue reading
Why network visibility, manageability and security is vital in digital transformation
Digital transformation is a hot topic in the industry but the biggest challenge for enterprises is visibility, manageability and security of the network, NetScout said. “The digital success requires seamless visibility and monitoring for performance and security across a complex … Continue reading
Why network visibility, manageability and security is vital in digital transformation
Digital transformation is a hot topic in the industry but the biggest challenge for enterprises is visibility, manageability and security of the network, NetScout said. “The digital success requires seamless visibility and monitoring for performance and security across a complex … Continue reading
HP bolsters endpoint security capabilities with Bromium acquisition
After a multi-year partnership, HP has announced that it will acquire Bromium in an effort to bolster its endpoint security capabilities. California-based Bromium was found by former Citrix executives back in 2011 and the company specializes in deploying virtualization to … Continue reading
People are still the biggest security threat
New research from Proofpoint has revealed that more than 99 percent of cyberattacks require human interaction to execute. To compile its Human Factor report, the cybersecurity firm conducted an 18-month analysis of data collected across its global customer base. Vice … Continue reading
WordPress plugins have critical security flaw
Cyberattackers began using rogue admin accounts to launch attacks on WordPress sites last month and the attacks have continued, according to new research from Wordfence. Security researchers at the firm discovered that known vulnerabilities in WordPress plugins have been exploited … Continue reading
Kaspersky Security for Office 365 adds OneDrive protection
As businesses have moved away from local storage in favor of cloud storage, protecting sensitive files and documents stored in the cloud has become a top priority for organizations. However, according to Kaspersky's “Sorting out digital clutter in business” report, … Continue reading
Kaspersky Security for Office 365 adds OneDrive protection
As businesses have moved away from local storage in favor of cloud storage, protecting sensitive files and documents stored in the cloud has become a top priority for organizations. However, according to Kaspersky's “Sorting out digital clutter in business” report, … Continue reading
Phishing is the top security threat for businesses
A security service developed by the telecommunications firm Telefónica, in collaboration with McAfee and Allot, has revealed that the majority of the threats (89%) it has blocked so far are related to phishing. During the first two months in which … Continue reading