The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

THURSDAY, MAY 26, 2016

Featured

Archives

Latest Comments

Social Networks

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved. The denomination comes from Greek and it means “same structure”, in […]

Read more ...

A new scam is tricking users of WhatsApp into downloading a so-called exclusive version of the app called ‘WhatsApp Gold’, which infects mobile devices with malware. A number of WhatsApp users have reported receiving messages that urge them to sign up for the ‘premium’ service through the WhatsApp Gold website, linked in the message. Users […]

Read more ...

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments. David Richardson, director of product at Lookout, and his team recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware.

Read more ...

Data Loss Prevention has evolved beautifully in the last few years. The measure of control that DLP now provides is extremely powerful, and helps organizations from all sectors and of all sizes minimize the risk of data theft and loss, and protect their intellectual property as well as other type of sensitive data. DLP is […]

Read more ...