The Latest in IT Security

minus
  • img
  • img
  • img
plus

Categories

FRIDAY, MAY 25, 2018

Featured

Archives

Latest Comments

Social Networks

In recent years the global payment landscape has undergone a seachange. Gone are the days where financial transactions impacted only core and branch banking. In the last few years, fintechs have opened previously unimaginable avenues for individuals and businesses alike. Fueled by the mobile revolution, the financial vocabulary has grown to include tablet banking, mobile […]

Read more ...

The Process Doppelgänging technique was first presented in December 2017 at the BlackHat conference. Since the presentation several threat actors have started using this sophisticated technique in an attempt to bypass modern security solutions. In April 2018, we spotted the first ransomware employing this bypass technique – SynAck ransomware. It should be noted that SynAck […]

Read more ...

As Senate Bill 315 sits on Georgia Governor Nathan Deal’s desk, awaiting either his signature of approval or a veto, a group of vigilante hackers going by SB315 have reportedly been attacking Georgia sites and threatening retaliation if the bill becomes law. It’s unclear why the group believes that a hacking spree will help convince […]

Read more ...

Every time an executive at your company enters an airport, mobile security is at a heightened level of risk. Of course, laptops, tablets and smartphones are vulnerable to loss, theft or attack all the time, everywhere. This is a constant challenge and source of worry for IT leaders. At an airport, however, the normal user […]

Read more ...