Consumers are increasingly turning to online shopping to get their holiday lists done. Unfortunately, cybercriminals are also expected to take advantage of the consumer rush. Here's how you can protect yourself this shopping season.
We recently encountered a cryptocurrency-mining malware affecting Linux systems. It is notable for being bundled with a rootkit component that hides the malicious process’ presence from monitoring tools.
An event like the World Cup raises security issues, and it's not just about the need to physically secure everything from the venues and the audience to the players and delegates -- digital security is just as important.
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.
Fileless malware is a growing threat in 2018 and requires sophisticated detection tools to find and block it. Microsoft finds two obfuscated and malicious scripts which were using the Sharpshooter technique.
Security researchers recently discovered a banking trojan named DanaBot being distributed to European countries via spam emails. Here’s what users and businesses need to know about this threat and how managed detection and response can help address it.