Latest News

For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.

Close

Not a member yet? Register now and get started.

lock and key

Sign in to your account.

Account Login

Latest News

Ransomware: How to recover your encrypted files, the last guide

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows operating system. Why my system asks me to pay? A ransomware is a computer malware that limits the access of a system and ask for a ransom in order to remove that restriction. The restriction […]

Read more...

Sundown Exploit Kit ‘Larger Threat Than People Realize’

t’s been a tumultuous summer for exploit kits with the demise of Angler, Neutrino and Nuclear, for years each responsible for massive amounts of dollar losses and malware infections. Now, Cisco Talos security researchers are bracing for new entrants to fill the void, starting with the Sundown exploit kit. Over the past six months, Sundown […]

Read more...

4 Types of Cyber Attacks Targeting Manufacturers

The manufacturing industry is not a new target for cyber attacks, but it is experiencing new kinds of attacks. Here’s how to protect your operations. It turns out that things have changed quite a bit recently—most notably, around the types of attacks being aimed at manufacturing sites. Right now, we’re seeing a new wave of […]

Read more...

Researchers find out New Linux Backdoor

Security researchers from a Russian Anti-malware company, have detected a new backdoor dubbed Linux.BackDoor.Dklkt.1 that targets Linux operating systems. However, the signature of the backdoor has been added to virus databases. So, its Linux users are under reliable protection. The researchers have claimed that backdoor is supposedly of Chinese origin. They have said that the […]

Read more...

Mobile Security Challenges In The Age Of Digital Business

After three decades where managing endpoints was synonymous with imposing strict security on laptops, enterprises are about to face a much greater security challenge. IT leaders are asked to protect their enterprise data not just on smartphones and tablets, but while it travels through the Internet of Things (IoT), on connected cars, on smart TVs, […]

Read more...

49 busted in Europe for Man-in-the-Middle bank attacks

A multination bust on Tuesday nabbed 49 suspects spread throughout Europe. They were arrested on suspicion of using Man-in-the-Middle (MiTM) attacks to sniff out and intercept payment requests from email. As Europol detailed in a statement, the raid was coordinated by Europol’s European Cybercrime Centre (EC3) and Eurojust, led by Italian Polizia di Stato (Postal […]

Read more...

What Data Breaches Now Cost And Why

New Ponemon report says the cost of a data breach has increased by 23% and healthcare and education breaches are the most pricey. The actual cost of a data breach is all about industry sector and location, location, location. Healthcare and education sectors incur the highest breach costs of all industries, and Germany and the […]

Read more...

Why You Should Enroll In Cyber Security Awareness Training

When it comes to cyber security, even big organizations lack the basic knowledge of how to protect company’s data from the outside. Everyday businesses are facing the threat of phishing, ransomware, data breaches and malware attacks that not only results in millions of dollars losses, but also damaged the reputations. A new study shows that […]

Read more...

Venom Vulnerability Exposes Most Data Centers to Cyber Attacks

A security researcher disclosed the vulnerability in the virtual Floppy Drive Code used by many computer virtualization platforms. Vulnerability VENOM, attacker can easily escape from the confines of virtual machine guest and exploit the code-execution access to the host. This may result in elevated access to the host’s local network and adjacent systems. By exploiting […]

Read more...

Industry IT security shortfalls persist

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity solutions in order to secure computing resources, information, networks and applications. As such, innovations will be directed towards fortifying sophisticated technologies such as cloud computing, big data, wireless communication, and the Internet […]

Read more...