Cybercrime & Digital Threats
- January 30, 2017Email remains an important communication tool for business organizations. Unfortunately, its widespread use also makes it an ideal platform for cybercrime. Here are some tips for dealing with email-based threats.
- January 23, 2017Web injections are every programmer, developer and information security (InfoSec) professional’s headache—and a permanent fixture in a cybercriminal’s toolkit. Here are some countermeasures that can be employed to mitigate, if not thwart, these attacks.
- January 19, 2017A look at some of the most notable ransomware stories in the first two weeks of 2017.
- January 12, 2017Guidelines for spotting and managing Indicators of Compromise (IoCs).
- January 10, 2017From ransomware infecting a smart TV on Christmas day to malware used in cyber-espionage being updated with new capabilities, here are the most notable stories from the last two weeks of 2016.
- January 03, 2017From new payment options to an alternative way of selling ransomware, here's a look at the most notable events from last few weeks of 2016.
- December 12, 2016From the SFMTA ransomware attack to variants adopting techniques used by tech support scams, here's a look at the most notable ransomware updates in the past two weeks.
- November 28, 2016Economic espionage should not only concern nation-states; any company, regardless of size, is at risk of losing intellectual property to attackers and rivals. What can enterprises do to defend against these attacks?
- November 24, 2016From Cerber's continuing reign as one of the most active variants seen in today's ransomware landscape to additions that aim to make the same impact as its predecessors. Here are some of the most notable stories on ransomware in the past two weeks.