The Latest in IT Security

Posts Tagged ‘Attacks’

Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number of overall malware encounters is decreasing, malware attacks are more sophisticated and short-lived than ever before. Many attacks appear, infect, and disappear within hours—even minutes—having successfully exfiltrated […]

Read more ...

New report shows risk of not inspecting encrypted packets. There’s an important caveat about encrypted traffic from new research released this week: Encryption works so well that hackers are using it as cover. A new study from A10 and the Ponemon Institute found that 80% of respondents say their organizations have been the victim of […]

Read more ...

Once again, point-of-sale malware has been making headlines. A few new recent attacks have again brought the importance of protecting against this kind of malware to the forefront of cyber security managers’ minds. In the past, POS malware has been in and out of the limelight, with one of the most important examples being the […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments