This Infosec Guide will tackle the primary threats organizations face when implementing BYOD programs, as well as best practices and solutions to mitigate these threats.
This week we see ransomware disguise itself as a PC game, a popular sci-fi hero also makes an appearance, and new cryptocurrency starts to gain traction.
In 2012, we predicted that we would soon see an African underground market take root. Our recent joint research effort with the INTERPOL on the West African threat landscape may just be even greater proof of that.