The Latest in IT Security

1

The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of Service attacks, which could eliminate organizations’ backups and safety nets. Also, with the advent of the Internet of Things, key industries are bringing more operations online, increasing attack surfaces.

Read more ...

1

This spring, the author of the NukeBot banking Trojan published the source code of his creation. He most probably did so to restore his reputation on a number of hacker forums: earlier, he had been promoting his development so aggressively and behaving so erratically that he was eventually suspected of being a scammer.

Read more ...

1

Managed service providers have a unique position in the market. Providers have to be IT experts in a variety of areas, from hardware to customer support. Their business is built on upholding their clients’ business continuity. Unfortunately, various factors can violate this continuity, and sometimes they cannot be controlled from the MSP side.

Read more ...

1

Black Hat USA researchers tested more than 30,000 types of malware to learn the effectiveness of endpoint security tools – and they’ll demonstrate how they did it.
If your business has recently shopped for an endpoint security tool, you’ve heard the hype.

Read more ...

Categories

TUESDAY, JULY 25, 2017

Featured

Archives

Latest Comments

Social Networks