The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide. Read More ▶ |
|
| White Paper: Palo Alto Networks Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More ▶ | President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year's election, as his successor Donald Trump casts doubt over Russia's possible involvement. Read More ▶ |
| ASUS Chromebook C202 features a 180-degree hinge, spill-resistant keyboards, and reinforced rubber wrapped frames that meet the daily rigors and intense usage at home or by students both inside and outside of the classroom. Read More ▶ |
| A remotely exploitable vulnerability in the Nighthawk line of Netgear routers was disclosed on Friday. The flaw leaves customers exposed to having their connections hijacked, as someone exploiting the vulnerability can take complete control of the device. Despite having months to address the problem, Netgear has yet to publish a fix. Read More ▶ |
| | The new year will bring security challenges and its share of opportunities. Read More ▶ |
| Despite all the efforts to strengthen passwords and reduce risks this year, there are some things people still missed Read More ▶ |
| Video/Webcast: Keeper Security Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|