Organizations can step up their defenses against CEO fraud by knowing how to identify the signs that an e-mail is being used for the scam. What are the signs to watch out for?
Web injections are every programmer, developer and information security (InfoSec) professional’s headache—and a permanent fixture in a cybercriminal’s toolkit. Here are some countermeasures that can be employed to mitigate, if not thwart, these attacks.
From ransomware infecting a smart TV on Christmas day to malware used in cyber-espionage being updated with new capabilities, here are the most notable stories from the last two weeks of 2016.
From the SFMTA ransomware attack to variants adopting techniques used by tech support scams, here's a look at the most notable ransomware updates in the past two weeks.
Economic espionage should not only concern nation-states; any company, regardless of size, is at risk of losing intellectual property to attackers and rivals. What can enterprises do to defend against these attacks?
From Cerber's continuing reign as one of the most active variants seen in today's ransomware landscape to additions that aim to make the same impact as its predecessors. Here are some of the most notable stories on ransomware in the past two weeks.