Quantcast
Channel: botnets
Browsing all 527 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Stolen Memories: Why cyber thieves attack personal over financial data

In the never-ending war against cybercrime, half the battle lies in raising public awareness about the nature of the threats out there. If everyday computers users are more clued into the security and...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 3, 2017

Late last week, a buffer overflow vulnerability in IIS 6.0 on Windows 2003 servers, identified by CVE-2007-7269, was publicly disclosed. The vulnerability can be exploited since no bounds checking is...

View Article

Image may be NSFW.
Clik here to view.

Worry-Free Services, powered by XGen™ Security

According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber...

View Article

Image may be NSFW.
Clik here to view.

Why Scammers Want Your Tax Returns (and how to stop them)

It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 10, 2017

Earlier this week marked the end of support for Windows Vista. This means anyone using Vista will no longer receiving new security updates, non-security hotfixes, free or paid assisted support options,...

View Article

Image may be NSFW.
Clik here to view.

Big data and machine learning: A perfect pair for cyber security?

Online threats are emerging at a faster rate than ever. Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicous programs...

View Article


Image may be NSFW.
Clik here to view.

Setting Sail with Docker

This week thousands of people are heading to Austin, Texas for DockerCon 2017. Docker’s popularity has been explosive, with thousands of organizations using it’s platform to modernize applications,...

View Article


Image may be NSFW.
Clik here to view.

Pragmatic Hybrid Cloud Security

It’s easy to get lost in a sea of marketing terms. Recently “Hybrid Cloud” has bubbled up more and more. The good news here is that the term is an accurate and useful way to describe the reality that...

View Article

Image may be NSFW.
Clik here to view.

4 ways mobile devices still threaten your business

Mobile devices have been commonly used in corporate environments for decades – bulky portable telephones, heavy laptops and PDAs. Then along came Apple and the smartphone, and soon everyone either had...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 17, 2017

I’ve never been one to adopt the latest fashion trends, aside from what I wore growing up in the 1980s. I wore shoulder pads, blue eyeliner, designer jeans, and even parachute pants. While I continue...

View Article


Image may be NSFW.
Clik here to view.

Pawn Storm: The Power of Social Engineering

In our latest report on Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.), researchers expose the scope and scale of the cyber espionage group’s attacks but more importantly their cyber...

View Article

Image may be NSFW.
Clik here to view.

A Storm’s a Coming: How businesses can defend against threat actor groups...

Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different...

View Article


Image may be NSFW.
Clik here to view.

Linux is secure…right?

“There are no threats for Linux servers. Aren’t they built to be secure?” “Linux servers are so secure and hardened, why do we need security controls on those?” “I do understand there are threats out...

View Article

Image may be NSFW.
Clik here to view.

Machine learning and the fight against ransomware

Ransomware is now everywhere. The number of emails containing ransomware rose 6,000 percent since 2015, and in 2016, 40 percent of all spam emails had one of these malicious programs hidden within,...

View Article


Image may be NSFW.
Clik here to view.

Trend Micro and INTERPOL: Teaming Up Again to Fight Global Cybercrime

At Trend Micro we have a long history of partnering with law enforcement whenever called upon. We believe that the skills and resources of the private sector can offer allow law enforcement to surge...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 24, 2017

There was a time when a person’s motivation to hack something was for financial reasons or for street cred. But now we’re seeing organizations that have other motivations. Pawn Storm is a...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article
Browsing all 527 articles
Browse latest View live